Professional Documents
Culture Documents
O Level Computer Science Resoruce Paper 1
O Level Computer Science Resoruce Paper 1
www.cs2210.blogspot.com
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (NH/SW) 171198
© UCLES 2018 [Turn over
Page 1 of 400
Muhammad Qadeer (0333-8136280)
2 www.cs2210.blogspot.com
Draw a line to connect each output device to the most appropriate description.
Device Description
3D Printer
Uses liquid ink to generate
a physical output
2D Cutter
Uses a high-power laser to
generate a physical output
[5]
Page 2 of 400
Muhammad Qadeer (0333-8136280)
3 www.cs2210.blogspot.com
2 Parity checks and Automatic Repeat reQuests (ARQ) can be used to check for errors during data
transmission and storage.
(a) A system uses even parity. Write the appropriate parity bit for each byte.
Parity Bit
1 0 1 0 0 1 1
1 0 1 1 1 1 1
1 0 1 0 0 0 1
[2]
(b) Explain how Automatic Repeat reQuests (ARQ) are used in data transmission and storage.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(c) State one other method that could be used to check for transmission errors.
...............................................................................................................................................[1]
3 An elevator (lift) has a maximum weight limit of 2400 kg. The weight carried is monitored by a
sensor and a microprocessor.
Describe how the sensor and the microprocessor are used to make sure the maximum weight
limit is not exceeded.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
© UCLES 2018 2210/13/O/N/18 [Turn over
Page 3 of 400
Muhammad Qadeer (0333-8136280)
4 www.cs2210.blogspot.com
A section of a MAC address is shown. Each pair of hexadecimal digits is stored using 8-bit binary.
(a) Complete the table to show the 8-bit binary equivalents for the section of MAC address. The
first number has already been converted.
6A FF 08 93
01101010
[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
...................................................................................................................................................
...............................................................................................................................................[1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
Page 4 of 400
Muhammad Qadeer (0333-8136280)
5 www.cs2210.blogspot.com
Describe three methods that she could use to avoid loss of stored data.
Method 1 ..........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Method 2 ..........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Method 3 ..........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[6]
7 David is writing a program using a high-level language. The program will be published and sold for
profit.
Feature 1 ..................................................................................................................................
...................................................................................................................................................
Feature 2 ..................................................................................................................................
...................................................................................................................................................
Feature 3 ..................................................................................................................................
...................................................................................................................................................
[3]
Benefit 1 ...................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Benefit 2 ...................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
Page 6 of 400
Muhammad Qadeer (0333-8136280)
7 www.cs2210.blogspot.com
(c) David needs to send a large section of the programming code as an email attachment.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(b) Explain how the web browser uses the URL to access the webpage.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
9 Describe two differences between Read Only Memory (ROM) and Random Access Memory
(RAM).
Difference 1 .......................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Difference 2 ......................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[4]
Page 8 of 400
Muhammad Qadeer (0333-8136280)
9 www.cs2210.blogspot.com
(a) Complete the truth table for the given logic circuit.
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
B X
[6]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
Page 10 of 400
Muhammad Qadeer (0333-8136280)
11 www.cs2210.blogspot.com
12 Explain the difference between a Musical Instrument Digital Interface (MIDI) file and a MP3 file.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
13 State which types of storage device or media would be most suitable for these scenarios.
...................................................................................................................................................
Justification ...............................................................................................................................
...................................................................................................................................................
[2]
...................................................................................................................................................
Justification ...............................................................................................................................
...................................................................................................................................................
[2]
(c) Storing a 1200 MB high-definition promotional movie about a new car. The movie is to be
given to people who are interested in buying a new car.
...................................................................................................................................................
Justification ...............................................................................................................................
...................................................................................................................................................
[2]
Page 11 of 400
Muhammad Qadeer (0333-8136280)
12 www.cs2210.blogspot.com
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Page 12 of 400
Muhammad Qadeer (0333-8136280)
www.cs2210.blogspot.com
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2018 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
Page 13 of 400
2210/13 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November 2018
PUBLISHED www.cs2210.blogspot.com
Generic Marking Principles
These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.
Page 14 of 400
2210/13 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November 2018
PUBLISHED www.cs2210.blogspot.com
GENERIC MARKING PRINCIPLE 5:
Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.
Page 15 of 400
2210/13 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks
Device Description
Page 16 of 400
2210/13 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks
Parity Bit
0 1 0 1 0 0 1 1
0 1 0 1 1 1 1 1
1 1 0 1 0 0 0 1
2(c) Checksum 1
3 Six from: 6
• A pressure sensor is used
• The sensor sends data/signals to the microprocessor
• Data is converted to digital format
• Microprocessor compares data value against set value
• If value <= 2400 Kg/under weight limit lift is permitted to operate
• If value > 2400 Kg/over weight limit signal is sent from the microprocessor to deliver warning message to
passengers
• If value > 2400 Kg signal is sent from the microprocessor to lift mechanism to stop lift operating
• Weight continuously monitored
Page 17 of 400
2210/13 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks
5(b) USB / SATA / Wifi /PCI Express / Any appropriate serial device 1
Page 18 of 400
2210/13 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks
Backups
• Make a copy of the data
• Copy stored away from main computer
• Data can be restored from backup
Anti-virus
• Scans computer for viruses
• Software to detect/remove viruses
• Can prevent data being corrupted by viruses
Firewall
• Hardware or software that monitors network traffic
• To help prevent hackers gaining access / deleting data
Password/Biometrics
• To help protect files / computer from unauthorised access
Restricted access
• To stop users downloading/installing software that could harm
Verification
• Message e.g. to ask if definitely want to delete
Physical methods
• Locks/alarms/CCTV to alert/deter unauthorised access
Page 19 of 400
2210/13 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks
Page 20 of 400
2210/13 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks
9 Four from: 4
• ROM is permanent
• RAM is temporary
• ROM is non-volatile
• RAM is volatile
Page 21 of 400
2210/13 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks
0 0 0 0
0 0 1 0
0 1 0 1
0 1 1 1
1 0 0 0
1 0 1 1
1 1 0 0
1 1 1 0
Page 22 of 400
2210/13 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks
Page 23 of 400
2210/13 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks
MIDI
• Instructions of how to make sound
• Non-audio recording
• File created using digital musical instruments
• Produced by synthesizer
• Used when composing music
• Individual notes/instruments can be changed
Page 24 of 400
2210/13 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks
• Easy to distribute
• Small in size
• Cheap to buy
• Universal storage therefore compatible with many devices
Page 25 of 400
Muhammad Qadeer (0333-8136280)
www.cs2210.blogspot.com
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (KS) 171196
© UCLES 2018 [Turn over
Page 26 of 400
Muhammad Qadeer (0333-8136280)
2 www.cs2210.blogspot.com
B U S
66 85 83
66
85
83
[3]
K E Y
01001011 ...............................................
01000101 ...............................................
01011001 ...............................................
[3]
Page 27 of 400
Muhammad Qadeer (0333-8136280)
3 www.cs2210.blogspot.com
1 .........................................................................................................................................
2 .........................................................................................................................................
3 .........................................................................................................................................
[3]
(iii) State two benefits of using hexadecimal notation to represent binary values.
Benefit 1 ............................................................................................................................
...........................................................................................................................................
Benefit 2 ............................................................................................................................
...........................................................................................................................................
[2]
RAM ROM
Statement
(✓) (✓)
(b) Circle the storage category that includes both RAM and ROM.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
3 A greenhouse uses a system to monitor the conditions that plants need to grow.
Binary
Input Condition
value
1 Window is open
W
0 Window is closed
1 Temperature >=26 °C
T
0 Temperature <26 °C
1 Humidity >=50%
H
0 Humidity <50%
The system will sound an alarm when certain conditions are detected.
or
T X
[5]
Page 29 of 400
Muhammad Qadeer (0333-8136280)
5 www.cs2210.blogspot.com
4 (a) Identify three security issues that can put a computer system at risk.
(b) Explain how a firewall can help to protect a computer system from security issues.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
5 (a) Karina is taking her Computer Science examination. She has three questions to answer
about output devices.
“It is a high powered laser that cuts materials such as thin metals or wood.”
.......................................................................................................................................[1]
“The screen is made up of blocks of red, green and blue pixels. The screen uses layers
of different types of liquid.”
.......................................................................................................................................[1]
“It is responsible for powering and moving a motor in machinery, such as a robot arm in
a factory.”
.......................................................................................................................................[1]
(b) Karina correctly answers another examination question about some more output devices.
Complete the sentences in Karina’s answer, using the list given. Not all terms in the list need
to be used.
• 3D
• digital light projector
• inkjet
• interactive whiteboard
• laser
• rotating
• scanning
• sliding
• speaker
• thermal bubble
surface using a pen, the text and drawings can then be captured and stored for later use.
Page 31 of 400
Muhammad Qadeer (0333-8136280)
7 www.cs2210.blogspot.com
6 (a) Many programmers write computer programs in high-level languages. The programs need to
be translated into machine code to be read by the computer.
Translator 1 ...............................................................................................................................
Translator 2 ...............................................................................................................................
[2]
(b) Explain two reasons why a computer programmer may choose to write a program in a high-
level language, rather than a low-level language.
Reason 1 ..................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Reason 2 ..................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
Tick (✓) to show whether each example of computer code is High-level language, Assembly
language or Machine code.
Hyper Text Transfer Protocol The website address that is typed into the
(HTTP) address bar
[5]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
Page 33 of 400
Muhammad Qadeer (0333-8136280)
9 www.cs2210.blogspot.com
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(b) Data can sometimes be corrupted when it is transmitted from one computer to another,
causing errors to be present in the data.
Identify and describe three methods of error detection that could be used to see if an error
has occurred.
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Description .................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[9]
Page 35 of 400
Muhammad Qadeer (0333-8136280)
11 www.cs2210.blogspot.com
The pH of the water should be between 6 and 8. The system outputs an alert if the pH of the water
is not in this range.
Explain how the system uses the pH sensors and the microprocessor to help monitor the pollution.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[5]
Page 36 of 400
Muhammad Qadeer (0333-8136280)
12 www.cs2210.blogspot.com
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Page 37 of 400
Muhammad Qadeer (0333-8136280)
www.cs2210.blogspot.com
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2018 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
Page 38 of 400
2210/12 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November 2018
PUBLISHED www.cs2210.blogspot.com
Generic Marking Principles
These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.
Page 39 of 400
2210/12 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November 2018
PUBLISHED www.cs2210.blogspot.com
GENERIC MARKING PRINCIPLE 5:
Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.
Page 40 of 400
2210/12 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks
66 0 1 0 0 0 0 1 0
85 0 1 0 1 0 1 0 1
83 0 1 0 1 0 0 1 1
Page 41 of 400
2210/12 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks
2(b) Primary 1
Page 42 of 400
2210/12 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks
Page 43 of 400
2210/12 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks
5(a)(iii) Actuator 1
5(b) 1 mark for each correct missing word, in the given order: 5
• interactive whiteboard
• inkjet
• thermal bubble
• laser
• rotating
© UCLES 2018 Page 7 of 12
Page 44 of 400
2210/12 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks
6(a) • Compiler 2
• Interpreter
Page 45 of 400
2210/12 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks
10110111
11001100 9
01011100
FOR X = 1 TO 10
PRINT X 9
NEXT X
INP X
STA X 9
LDA Y
Page 46 of 400
2210/12 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks
Page 47 of 400
2210/12 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks
8 Four from: 4
• Used to attend to certain tasks/issues
• Used to make sure that vital tasks are dealt with immediately
• The interrupt/signal tells the CPU/processor (that its attention is required)
• A signal that can be sent from a device (attached to the computer)
• A signal that can be sent from software (installed on the computer)
• The interrupt will cause the OS/current process to pause
• The OS/CPU/ISR will service/handle the interrupt
• They have different levels of priority
• After the interrupt is serviced, the (previous) process is continued
• It enables multi-tasking to be carried out on a computer
• A valid example of an interrupt e.g. ‘out of paper’ message for a printer
Page 48 of 400
2210/12 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks
Checksum
• Calculation performed on data (to get the checksum)
• Checksum sent with data
• Checksum recalculated after transmission
• Comparison made between checksum before and checksum after transmission
• Error detected if checksums are different
10 Five from: 5
• The sensor sends data to the microprocessor
• The analogue data is converted to digital (using ADC)
• The microprocessor compares the reading to the set range/stored values/stored data (6 to 8) «
– « If the reading is >8 or <6 / outside range «
o « the microprocessor sends a signal to output the alert
• The process is continuous/repeated
Page 49 of 400
Muhammad Qadeer (0333-8136280)
www.cs2210.blogspot.com
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (JM) 162278
© UCLES 2018 [Turn over
Page 50 of 400
Muhammad Qadeer (0333-8136280)
2 www.cs2210.blogspot.com
1 Different units of data can be used to represent the size of a file, as it changes in size.
• byte
• gigabyte (GB)
• megabyte (MB)
• nibble
Smallest bit
………………………………………………..
………………………………………………..
kilobyte (kB)
………………………………………………..
………………………………………………..
2 (a) Nancy has captured images of her holiday with her camera. The captured images are stored
as digital photo files on her camera.
Explain how the captured images are converted to digital photo files.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
Page 51 of 400
Muhammad Qadeer (0333-8136280)
3 www.cs2210.blogspot.com
Many of the photos are very large files, so Nancy needs to reduce their file size as much as
possible.
Identify which type of compression would be most suitable for Nancy to use. Explain your
choice.
Explanation ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
0 2 3 1 5 8
Hours Minutes Seconds
(a) Write the 8-bit binary numbers that are currently stored for the Hours, Minutes and Seconds.
Hours
Minutes
Seconds
[3]
Hours 0 0 0 0 0 1 0 1
Minutes 0 0 0 1 1 0 1 0
Seconds 0 0 1 1 0 1 1 1
Write the denary values that will now be shown on the stopwatch.
Jafar remembers that hexadecimal is often used to represent binary values in error codes.
Convert the hexadecimal number in the error message into 12-bit binary.
[3]
Page 53 of 400
Muhammad Qadeer (0333-8136280)
5 www.cs2210.blogspot.com
5 The three binary numbers in the registers X, Y and Z have been transmitted from one computer to
another.
Parity bit
Register X 1 0 0 1 0 0 1 0
Register Y 1 1 1 0 0 1 1 1
Register Z 1 1 1 0 1 0 0 1
Only one binary number has been transmitted correctly. This is identified through the use of a
parity bit.
Identify which register contains the binary number that has been transmitted correctly. Explain
the reason for your choice.
The binary number that has been transmitted correctly is in Register ............................................
Explanation ......................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[4]
6 Kelvin correctly answers an examination question about the Von Neumann model.
• accumulator (ACC)
• address bus
• arithmetic logic unit (ALU)
• control unit (CU)
• data bus
• executed
• fetches
• immediate access store (IAS)
• memory address register (MAR)
• memory data register (MDR)
• program counter (PC)
• saved
• transmits
Any calculations that are carried out on the data are done by the
Page 55 of 400
Muhammad Qadeer (0333-8136280)
7 www.cs2210.blogspot.com
B X
[6]
(b) Complete the truth table for the given logic statement.
A B C Working space X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
He needs to send just the machine code for the program to his friend, electronically.
Identify which translator will be most suitable for Dimitri to use. Explain your choice.
Explanation ......................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[4]
.............................................................................................................................................. [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
© UCLES 2018 2210/12/M/J/18
Page 57 of 400
Muhammad Qadeer (0333-8136280)
9 www.cs2210.blogspot.com
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
She presses an icon on her touch screen but her action is not registered.
(i) Explain why the touch screen will not register her touch.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [2]
Explain how Alexandra could use her mobile device whilst still wearing gloves.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [2]
11 A factory uses a security system to control a security light. The system uses a sensor and a
microprocessor.
Explain how the security system makes use of the sensor and the microprocessor to control the
security light.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [6]
Page 59 of 400
Muhammad Qadeer (0333-8136280)
11 www.cs2210.blogspot.com
12 (a) Selma has some important personal information that she needs to email to her employer.
She wants to make sure that if the personal information is intercepted, it cannot be understood.
(i) State how Selma could email her personal data more securely.
...................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [5]
(b) Selma wants to make sure that the information received is correct.
Describe another error detection method that can be used to check the information received
is correct.
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
Page 60 of 400
Muhammad Qadeer (0333-8136280)
12 www.cs2210.blogspot.com
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Page 61 of 400
Muhammad Qadeer (0333-8136280)
www.cs2210.blogspot.com
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2018 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and
some Cambridge O Level components.
Page 62 of 400
2210/12 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
May/June 2018
PUBLISHED www.cs2210.blogspot.com
Generic Marking Principles
These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.
Page 63 of 400
2210/12 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
May/June 2018
PUBLISHED www.cs2210.blogspot.com
GENERIC MARKING PRINCIPLE 5:
Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.
Page 64 of 400
2210/12 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
May/June 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks
– nibble
– byte
– megabyte (MB)
– gigabyte (GB)
– Lossy
Page 65 of 400
2210/12 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
May/June 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks
Hours 0 0 0 0 0 0 1 0
Minutes 0 0 0 1 1 1 1 1
Seconds 0 0 1 1 1 0 1 0
0 5 2 6 5 5
Hours Minutes Seconds
1 1 0 1 0 0 0 0 0 0 1 1
Page 66 of 400
2210/12 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
May/June 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks
– Register Y
– fetches
– immediate access store // IAS
– program counter // PC
– memory address register // MAR
– memory data register // MDR
– executed
– arithmetic logic unit // ALU
– accumulator // ACC
Page 67 of 400
2210/12 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
May/June 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks
7(a) 1 mark for each correct logic gate with correct direct of input(s): 6
A B C Working space X
0 0 0 1
0 0 1 1
0 1 0 0
0 1 1 0
1 0 0 1
1 0 1 1
1 1 0 0
1 1 1 0
Page 68 of 400
2210/12 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
May/June 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks
– Compiler
Page 69 of 400
2210/12 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
May/June 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks
10(b)(ii) Any two from e.g. (1 mark for method, 1 for expansion): 2
– She could use a (conductive) stylus«
– « this will allow the charge to be charged/disturbed
12(a)(i) Encryption 1
Page 70 of 400
2210/12 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
May/June 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks
– ARQ
– uses acknowledgment and timeout
– A request is sent with data to acknowledge all data is received
– Acknowledgement sent back to say all data is received
– If no acknowledgement is received in a time frame an error in transmission detected / data automatically resent.
Page 71 of 400
Muhammad Qadeer (0333-8136280)
www.cs2210.blogspot.com
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (JM) 162279/1
© UCLES 2018 [Turn over
Page 72 of 400
Muhammad Qadeer (0333-8136280)
2 www.cs2210.blogspot.com
Complete the sentences in Jane’s answer, using the list given. Not all items in the list need to be
used.
• 2
• 10
• 16
• analogue
• binary
• denary
• digital
• hexadecimal
process this type of data. For a computer to be able to process data it needs to be
Write the denary number for each of the three hexadecimal numbers:
2A ....................................................................................................
101 ...................................................................................................
21E ..................................................................................................
[3]
Working Space
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Page 73 of 400
Muhammad Qadeer (0333-8136280)
3 www.cs2210.blogspot.com
3 The three binary numbers in the registers A, B and C have been transmitted from one computer to
another.
Parity bit
Register A 1 0 0 1 1 0 0 0
Register B 0 1 1 0 0 1 1 1
Register C 1 0 0 1 1 0 0 1
One binary number has been transmitted incorrectly. This is identified through the use of a parity bit.
Identify which register contains the binary number that has been transmitted incorrectly. Explain
the reason for your choice.
The binary number that has been transmitted incorrectly is in Register ..........................................
Explanation ......................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[4]
4 Michele wants to email a file to Elsa. The file is too large so it must be compressed.
(b) The file Michele is sending contains the source code for a large computer program.
Identify which type of compression would be most suitable for Michele to use.
Explanation ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
Page 75 of 400
Muhammad Qadeer (0333-8136280)
5 www.cs2210.blogspot.com
5 Six components of the Von Neumann model for a computer system and six descriptions are given.
Component Description
Arithmetic logic
Carries out the calculations on data.
unit (ALU)
B X
[6]
(b) Complete the truth table for the given logic statement.
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
Page 77 of 400
Muhammad Qadeer (0333-8136280)
7 www.cs2210.blogspot.com
7 Translators, such as a compiler and an interpreter, are used when writing and running computer
programs.
Compiler ...........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Interpreter .........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[6]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
(b) Explain how the barcode system could help the supermarket manage its stock.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
(c) An infrared touch screen is used to view and navigate the supermarket stock system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
© UCLES 2018 2210/11/M/J/18
Page 79 of 400
Muhammad Qadeer (0333-8136280)
9 www.cs2210.blogspot.com
(d) The supermarket uses secondary storage and off-line storage to store data about its stock.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
9 A business wants to use a biometric security system to control entry to the office.
Explain how the biometric security system will make use of the biometric device and the
microprocessor to control entry to the office.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[6]
10 RockICT is a music business that has a website to allow customers to view and buy the products
it sells.
(a) Describe what is meant by HTML structure and presentation for a web page.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
https://www.rockict.net/index.htm
Part 1 Part 2
Part 1 ................................................................................................................................
Part 2 ................................................................................................................................
[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
Page 81 of 400
Muhammad Qadeer (0333-8136280)
11 www.cs2210.blogspot.com
“RockICT makes use of cookies. By continuing to browse you are agreeing to our use of
cookies.”
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
(d) The music company is concerned about the security of its website.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
Page 82 of 400
Muhammad Qadeer (0333-8136280)
12 www.cs2210.blogspot.com
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Page 83 of 400
Muhammad Qadeer (0333-8136280)
www.cs2210.blogspot.com
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2018 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and
some Cambridge O Level components.
Page 84 of 400
2210/11 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
May/June 2018
PUBLISHED www.cs2210.blogspot.com
Generic Marking Principles
These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.
Page 85 of 400
2210/11 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
May/June 2018
PUBLISHED www.cs2210.blogspot.com
GENERIC MARKING PRINCIPLE 5:
Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.
Page 86 of 400
2210/11 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
May/June 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks
− analogue
− digital
− denary
− 10
− binary
− 2
− 42
− 257
− 542
− Register C
Page 87 of 400
2210/11 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
May/June 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks
Lossy (compression)
Lossless (compression)
− Lossless (compression)
Page 88 of 400
2210/11 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
May/June 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks
Component Description
Holds data and instructions when they are
Immediate access
loaded from main memory and are waiting
store (IAS)
to be processed.
Arithmetic logic
Carries out the calculations on data.
unit (ALU)
Page 89 of 400
2210/11 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
May/June 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks
6(a) 1 mark for each correct logic gate (with the correct direction of input(s)) 6
Page 90 of 400
2210/11 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
May/June 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks
A B C Working space X
0 0 0 1
0 0 1 1
0 1 0 1
0 1 1 1
1 0 0 0
1 0 1 1
1 1 0 1
1 1 1 1
Page 91 of 400
2210/11 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
May/June 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks
7 Compiler 6
Any three from:
− Translates high-level language into machine code/low level language
− Translates (the source code) all in one go/all at once
− Produces an executable file
− Produces an error report
Interpreter
Any three from:
– Translates high-level language into machine code/low level language
− Translates (the source code) line by line/statement by statement
– Stops if it finds an error
– Will only continue when error is fixed
Page 92 of 400
2210/11 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
May/June 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks
Page 93 of 400
2210/11 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
May/June 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks
− domain (name)
− file name/webpage name
Page 94 of 400
2210/11 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
May/June 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks
Page 95 of 400
Muhammad Qadeer (0333-8136280)
www.cs2210.blogspot.com
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (CE/SW) 152856
© UCLES 2017 [Turn over
Page 96 of 400
Muhammad Qadeer (0333-8136280)
2 www.cs2210.blogspot.com
One use of the display screen is to show an error code when a problem has occurred with a
washing cycle.
(a) State whether the display screen is an input, output or storage device.
...............................................................................................................................................[1]
E04
This error code means that the water will not empty out of the washing machine.
[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[1]
(d) Identify three sensors that could be used in the washing machine.
Sensor 1 ...................................................................................................................................
Use ...........................................................................................................................................
...................................................................................................................................................
Sensor 2 ...................................................................................................................................
Use ...........................................................................................................................................
...................................................................................................................................................
Sensor 3 ...................................................................................................................................
Use ...........................................................................................................................................
...................................................................................................................................................
[6]
© UCLES 2017 2210/13/O/N/17
Page 97 of 400
Muhammad Qadeer (0333-8136280)
3 www.cs2210.blogspot.com
Complete the table by providing a suitable file format for each file type. The first one has been
done for you.
http://www.cie.org.uk/index.htm
Part 1 Part 2 Part 3
Part 1 ........................................................................................................................................
Part 2 ........................................................................................................................................
Part 3 ........................................................................................................................................
[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
Draw a line to match each component with the most suitable description.
Component Description
[5]
Page 99 of 400
Muhammad Qadeer (0333-8136280)
5 www.cs2210.blogspot.com
B X
[4]
(b) Draw the symbol for an XOR gate and explain the function of this logic gate.
Explanation ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
2D .....................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
3D .....................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[6]
[6]
8 (a) Data is valuable. It needs to be kept secure and it can easily be damaged.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
(b) The Secure Socket Layer (SSL) protocol can be used to securely transmit data in online
banking.
Application 1 .............................................................................................................................
Application 2 .............................................................................................................................
Application 3 .............................................................................................................................
[3]
Online banking can be a risk as it can raise a number of security issues. SSL can be used as
a security method to make online banking safer.
Identify and describe three other security methods that could be used to make online banking
safer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) Kamil wants to store a 16-bit colour image file. The image size is 1000 pixels.
Working .....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2017 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level
components.
1(a) Output 1
E 0 4
1 1 1 0 0 0 0 0 0 1 0 0
– Temperature (sensor)
– To monitor the temperature of the water
– Pressure (sensor)
– To monitor the level of water in the washing machine
– Motion (sensor)
– To monitor whether the drum is still in motion
– pH (sensor)
– To monitor the level of water hardness/detergent present in the water
2D
– (Scanner) shines a light onto the surface of a document // Light moves across document
– Reflected light is captured
– Uses mirrors and lenses
– Captured image is converted into a digital file
– Produces a 2D digital image
3D
– Scanners shines a laser (or light) over the surface of a 3D object
– Records measurements of the geometry/dimensions of the object
– Measurements are converted to digital file
– Produces a 3D digital model
true false
Statement
(9) (9)
Firewalls can monitor incoming and outgoing traffic. 9
Firewalls operate by checking traffic against a set of rules. 9
Firewalls cannot block access to a certain website. 9
Firewalls can be software and hardware. 9
Firewalls can act as intermediary servers. 9
Firewalls can block unauthorised traffic. 9
– Strong password
– To make it difficult to hack an account
– Biometric device
– To use data that is difficult to fake as a password
– TLS // Encryption
– To make data meaningless if intercepted
– To encrypt data that is exchanged (TLS only)
– More secure than SSL (TLS only)
– Anti-spyware (software)
– To find and remove any spyware that is installed on a computer
– To help stop key loggers recording key presses
– Firewall
– To help prevent unauthorised access to an account
– Blocks any requests that do not meet/match the criteria
– Proxy server
– To divert an attack away from the main system
– 1000 × 16
– 16000/8
– Primary stores boot up instructions and can hold data whilst being processed
– Secondary stores files/software
true false
Statement
(9) (9)
Assembly language uses mnemonic codes. 9
Assembly language programs do not need a translator to be executed. 9
Assembly language is a low-level programming language. 9
Assembly language is specific to the computer hardware. 9
Assembly language is machine code. 9
Assembly language is often used to create drivers for hardware. 9
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (SC) 152928
© UCLES 2017 [Turn over
UP 1 1 1 1
DOWN 0 0 0 1
LEFT 1 0 0 1
RIGHT 0 1 1 0
OPEN 1 1 0 0
CLOSE 0 0 1 1
9 1 C 3 F
Convert the values and write down the operation (e.g. RIGHT) carried out by the robot arm.
9 .............................................................................
1 .............................................................................
C .............................................................................
3 .............................................................................
F .............................................................................
[5]
2 Storage devices and storage media can be categorised as primary, secondary or off-line.
Write primary, secondary or off-line next to each storage device or medium to indicate its most
suitable category.
HDD ....................................................................................................................................
RAM ....................................................................................................................................
ROM ....................................................................................................................................
CD-ROM ....................................................................................................................................
SSD ....................................................................................................................................
DVD-RAM ....................................................................................................................................
[6]
3 (a) Explain the differences between the binary number system and the denary number system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) Explain the process of converting the binary number 1010 into a denary number.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
© UCLES 2017 2210/12/O/N/17 [Turn over
Page 120 of 400
Muhammad Qadeer (0333-8136280)
4 www.cs2210.blogspot.com
Rory sends data from his computer to a file server that is approximately 100 metres away.
It is important that the data is transmitted accurately. Rory needs to be able to read data from and
write data to the file server at the same time.
(a) (i) Use ticks (3) to identify the most suitable data transmission methods for this application.
(ii) Explain why your answer to part (a)(i) is the most suitable data transmission.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[4]
(b) Identify and describe two methods of error checking that can be used to make sure that the
data stored after transmission is accurate.
Method 1 ...................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Method 2 ...................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
5 Raj is using the Internet to do some online shopping. He visits a website that tells him that it uses
cookies.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
Example 1 .................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Example 2 .................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
6 Selma writes the following four answers in her Computer Science examination.
“It is a signal. When the signal is received it tells the operating system that an event has occurred.”
“It takes source code written in a high level language and translates it into machine code. It
translates the whole of the source code at once.”
“The part of the central processing unit (CPU) that carries out calculations.”
“When data is transmitted, if an error is detected in the data received a signal is sent to ask for the
data to be retransmitted. This continues until the data received is correct.”
B X
[7]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
..............................GB [2]
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
She has a system that monitors the conditions for growing the fruit.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) State two sensors that could be used in this system and describe how they could be used.
Sensor 1 ...................................................................................................................................
Use ...........................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Sensor 2 ...................................................................................................................................
Use ...........................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
11 Complete the paragraphs choosing the correct five terms from the list. Each term can only be
used once:
• Ethics
• Freeware
• Free Software
• Hacking
• Malware
• Plagiarism
• Shareware
• Virus
Taking another person’s work from the Internet and claiming it as your own is called
One product that people may want to protect is software. ............................................. does allow
a person to share, copy and change software freely, but ............................................. does not
allow a person to do this legally. Software that has a licence allowing free use for a trial period
............................................. .
[5]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2017 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level
components.
9 – LEFT
1 – DOWN
C – OPEN
3 – CLOSE
F – UP
HDD – Secondary
RAM – Primary
ROM – Primary
CD-ROM – Off-line
SSD – Secondary
DVD-RAM – Off-line
• A binary number system has units/ placeholders/column headings that increase by the power of 2
• A denary number system has units/ placeholders/column headings that increase by the power of 10
• Binary has more digit for the same value// Denary has less digits for the same value
Serial 9 Simplex
Parallel Half-duplex
Duplex 9
Checksum
• A value is calculated from the data // Description of calculation
• Value is transmitted with data
• Value is recalculated after transmission
• If the values match the data is (more likely to be) accurate
Parity check
• A parity bit is transmitted with each byte of data
• Odd or even (parity can be used)
• Counts / checks number of 1’s // counts / checks to see if 1’s are even // counts / checks to see if 1’s are odd
• (Each byte is) checked after transmission to see if it matches the odd/even parity used
Echo (check)
• Copy of data is sent back to sender
• Data is compared to see if it matches
• If it does not match error detected
7 1 mark for each correct logic gate with the correct input(s) 7
8(a) 1 mark for correct calculation method, 1 mark for correct answer: 2
8(b) • Instructions/programs/data 2
• « currently in use
Moisture (sensor)
• To measure the water content of the soil
• To alert when the soil is too dry or too wet/needs watering
pH (sensor)
• To measure how acidic/alkaline the soil is
• To alert when there may be something polluting the soil
Light (sensor)
• To measure the brightness of the environment
• To alert when the fruit has too little/too much light
Temperature (sensor)
• To measure the temperature of the environment
• To alert when it is too hot/too cold for the fruit to grow
Gas (sensor)
• To measure the amount of CO2/oxygen present
• To alert when too much CO2/oxygen present
Humidity (sensor)
• To measure the water content in the air
• To alert when the air is too dry
• Plagiarism
• Free software
• Freeware
• Shareware
• Ethics
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (RW) 144486/1
© UCLES 2017 [Turn over
1 Name three different buses that are used in the fetch-execute cycle.
Bus 1 ������������������������������������������������������������������������������������������������������������������������������������������������
Bus 2 ������������������������������������������������������������������������������������������������������������������������������������������������
Bus 3 ������������������������������������������������������������������������������������������������������������������������������������������������
[3]
Primary
Example 1 ����������������������������������������������������������������������������������������������������������������������������������������
Example 2 ����������������������������������������������������������������������������������������������������������������������������������������
Secondary
Example 1 ����������������������������������������������������������������������������������������������������������������������������������������
Example 2 ����������������������������������������������������������������������������������������������������������������������������������������
Off-line
Example 1 ����������������������������������������������������������������������������������������������������������������������������������������
Example 2 ����������������������������������������������������������������������������������������������������������������������������������������
[6]
Laser printer High powered laser that uses the x-y plane.
[4]
4 There are various methods used to detect errors that can occur during data transmission and
storage.
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
Checksum ����������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
[8]
���������������������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
�����������������������������������������������������������������������������������������������������������������������������������������������[2]
(b)
Show the binary number from part (a) as it would be stored in the following registers.
Register 1
Register 2
[2]
(c)
A binary number stored in a register can have many different uses, for example an address in
main memory.
Use 1 ����������������������������������������������������������������������������������������������������������������������������������������
Use 2 ����������������������������������������������������������������������������������������������������������������������������������������
[2]
(d)
A register in a computer contains binary digits.
0 0 1 1 1 0 1 0
....................................................................................................................................................
................................................................................................................................................[1]
TSA Pre
Passenger Webb / Alan
Boarding
Group B 15 Boarding
Position
Flight 683
JFK – LAX
Date Thursday, November 10, 2016
Departs 8.15 pm
Gate C4
Time, gate and terminals may change - check monitors
Identify what type of barcode A is an example of. Explain how the data stored in this type of
barcode is read.
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
������������������������������������������������������������������������������������������������������������������������������������������������������[4]
(a)
Draw an arrow or arrows to show simplex, duplex and half-duplex data transmission. The
direction of the data transmission must be fully labelled.
Computer A Computer B
Computer A Computer B
Computer B Computer A
[6]
(b)
State a use for the following data transmission methods. The use must be different for each
data transmission method.
Simplex �������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
Duplex ��������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
[2]
(c)
A computer includes an Integrated Circuit (IC) and a Universal Serial Bus (USB) for data
transmission.
Describe how the computer uses these for data transmission, including the type of data
transmission used.
IC ����������������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
USB ������������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
[4]
(a)
Data is transmitted between the offices over the Internet. In order to keep the data safe the
company is using Secure Socket Layer (SSL) protocol and a firewall at each office.
Explain how SSL protocol and a firewall will keep the company’s data safe.
���������������������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
Firewall �������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
[4]
(b)
A company stores personal details of its customers on a computer system behind a firewall.
Explain, with reasons, what else the company should do to keep this data safe.
���������������������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
�����������������������������������������������������������������������������������������������������������������������������������������������[6]
9 A cold store is kept at a constant low temperature using a sensor, a microprocessor and a cooling
unit.
Explain how the sensor and microprocessor will maintain a constant low temperature.
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
������������������������������������������������������������������������������������������������������������������������������������������������������[6]
(a)
Draw the logic circuit.
B X
[4]
(b)
Complete the truth table for the given logic statement.
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
Explain how the information stored on the company’s website is requested by the customer, sent
to the customer’s computer and displayed on the screen.
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
������������������������������������������������������������������������������������������������������������������������������������������������������[7]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2017 series for most Cambridge IGCSE®,
Cambridge International A and AS Level and Cambridge Pre-U components, and some Cambridge O Level
components.
1 • address (bus) 3
• control (bus)
• data (bus)
Primary storage
• RAM
• ROM
Secondary storage
• hard disk drive (HDD)
• solid state drive (SSD)
3 4
Parity Check
• Checks a byte of data
• Check is performed when data is received
• A parity bit is added (to the parity byte)
• Counts / checks number of 1’s // counts / checks to see if 1’s are even
// counts / checks to see if 1’s are odd
• Can be even or odd
• If parity is incorrect, error is detected
Check digit
• A digit that is calculated from the data // uses modulo to calculate digit
// valid description of modulo
• It is appended / added to the data
• Digit is recalculated when data is entered
• Digits are compared to check for error
Checksum
• A value is calculated from the data // Valid description of calculation
• It is transmitted with the data
• Value is recalculated after transmission
• Values are compared after transmission to check for error
32 + 16 + 8 + 1
(00)111001
5(b) registers must have leading zeros, allow follow through from 5(a) for an 2
incorrect value
1 mark for each correct register.
0 0 1 1 1 0 0 1
0 0 0 0 0 0 0 0 0 0 1 1 1 0 0 1
• data
• ASCII value / Unicode value / character
• number
• part of image / small image
• a sound / sound sample / small sound track
• instruction
5(d) 3A 1
Three from:
• Barcode is captured / scanned / imaged, by a camera / scanner /
barcode reader / QR code reader
• Read using a laser
• Processed by an app
• Light is reflected back
• Black squares reflect less light than white squares
• Modules are used for orientation / alignment
• Squares / data are decoded
7(a) 1 mark for correct arrow(s), one mark for correct description 6
OR
AND
(Direction of data is both ways) but at different times / not at the same time /
not simultaneously / not concurrently
Simplex e.g.:
Microphone to computer
Sensor to computer
Computer to printer
Computer to speaker
Computer to monitor
Webcam to computer
Sending data to a device // sending data from a device
Duplex e.g.:
Telephone call
Voice over IP
Computer to printer (only award once)
Instant messaging
Broadband connections
Video conferencing
Sending data to and from devices e.g wireless technology
Computer to modem
IC
• parallel transmission // description of parallel
• for sending data internally
USB
• serial transmission // description of serial
• for sending data externally (to and from peripherals / between
devices)
SSL protocol
Two from:
• uses encryption
• encryption is asymmetric / symmetric / both
• makes use of (public and private) keys
• data is meaningless (without decryption key / if intercepted)
Firewall
Two from:
• helps prevent unauthorised access // helps prevent hacking
• checks that data meets criteria // identifies when data does not meet
criteria
• acts as a filter for (incoming and outgoing) data // blocks any
unacceptable data //allows acceptable data through
Physical method e.g. locked doors / CCTV timeout / auto log off
« to help prevent unauthorised access
Access rights «
« allows users access to data that they have permission to view
« prevents users from accessing data that they do not have permission to
view
9 Six from: 6
• temperature sensor
• analogue data / temperature is converted to digital data (with an ADC)
• sensor sends signal to the microprocessor
• microprocessor compares input values with stored values/pre-set
values «
• « if the temperature value input is too high/low «
• « a signal is sent from the microprocessor to turn on / off / up / down
the cooling unit
• « if temperature matches the stored values «
• « no action is taken
• an actuator is used to turn the cooling unit on / off / up / down
• the process is a continuous loop
10(a) 1 mark for each correct gate, with the correct input(s) 4
10(b) 4
A B C X
0 0 0 0
0 0 1 0
0 1 0 1
0 1 1 0
1 0 0 0
1 0 1 0
1 1 0 1
1 1 1 1
11 Seven from: 7
Requested
• a web browser is used
• user enters the URL / web address (into the address bar) // clicks a
link containing the web address // clicks an element of the webpage
• the URL / web address specifies the protocol
• protocols used are Hyper Text Transfer Protocol (HTTP) / Hyper Text
Transfer Protocol Secure (HTTPS)
Sent
• the URL / web address contains the domain name
• the Internet Service Provider (ISP) looks up the IP address of the
company
• the domain name is used to look up the IP address of the company
• the domain name server (DNS) stores an index of domain names and
IP addresses
• web browser sends a request to the web server / IP address
Received
• Data for the website is stored on the company’s web server
• webserver sends the data for the website back to the web browser
• web server uses the customer’s IP address to return the data
• the data is transferred into Hyper Text Mark-up Language (HTML)
• HTML is interpreted by the web browser (to display the website)
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (KN/SG) 144780
© UCLES 2017 [Turn over
0 0 1 0 1 0 0 1 1 1 1 1 1 1 0 0
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................... [2]
(b) Explain why a programmer might prefer to read the instruction in hexadecimal rather than in
binary.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................... [2]
Use 1 ........................................................................................................................................
...................................................................................................................................................
Use 2 ........................................................................................................................................
...................................................................................................................................................
[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................... [2]
(b) A program written in a high-level language is translated into machine code. This is so that it
can be processed by a computer.
.............................................................................................................................................. [1]
(c) Describe how your answer to part (b) translates this program.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
3 Steffi has a number of files of different sizes that contain her work.
true false
Statement
(3) (3)
4 Five statements about serial half-duplex data transmission are shown in the table below.
true false
Statement
(3) (3)
5 (a) Parity checks are often used to detect errors that may occur during data transmission.
The received bytes in the table below were transmitted using odd parity.
Tick (3) to show whether each byte has been corrupted during transmission or not
corrupted during transmission.
10110100
01101101
10000001
[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
6 Signals are sent to and from the components of a processor using buses.
Bus 1 ....................................................................
Purpose ............................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Bus 2 ....................................................................
Purpose ............................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[6]
Draw a line to match the security term with the most appropriate statement.
[5]
© UCLES 2017 2210/11/M/J/17 [Turn over
Page 166 of 400
Muhammad Qadeer (0333-8136280)
8 www.cs2210.blogspot.com
8 Complete the paragraph by choosing six correct terms from the list.
• Optical
• On-line
• RAM
• HDD
• Primary
• SSD
• Secondary
• ROM
• Off-line
A computer has two different types of memory. .................................... memory is not directly
accessed by the CPU, but it allows a user to store data that can easily be accessed by applications.
Two examples of this type of memory are .................................... and .................................... . The
the CPU. It allows the processor to access data and instructions that are stored in this memory.
9 A supermarket has a system that allows customers to check out their own shopping.
Identify and describe the purpose of two input devices and one output device used in this system.
Purpose ............................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Purpose ............................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Purpose ............................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[6]
A
X
B
A B Output (X)
0 0
0 1
1 0
1 1
[1]
(b) Write a logic statement that corresponds with the following logic circuit.
A
B
X = ..................................................................................................................................... [3]
Function 1 ........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Function 2 ........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Function 3 ........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[3]
(a) Identify two different sensors used in this application. Give an example of how each sensor
could be used in the chemical factory.
Sensor 1 ...................................................................................................................................
Use ...........................................................................................................................................
...................................................................................................................................................
Sensor 2 ...................................................................................................................................
Use ...........................................................................................................................................
...................................................................................................................................................
[4]
(b) Describe how the sensors and a microprocessor are used to monitor a process.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [5]
13 (a) Gurdeep wants to send a large file to Jennifer over the Internet.
Benefit 1 ...................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Benefit 2 ...................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
Choose the most suitable type of compression for the following and explain your choice.
Explanation .......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
Explanation .......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2017 series for most Cambridge IGCSE®,
Cambridge International A and AS Level and Cambridge Pre-U components, and some Cambridge O Level
components.
1(a) 1 mark for any two correct values, 2 marks for all 4 correct values. 2
29FC
2(c) Must relate to answer given in 2b. No follow through for incorrect answer in 3
part 2b.
6 1 mark for correct bus name and up to 2 further marks for appropriate 6
purpose.
Address (bus)
Two from:
• Carries / transports an address / location «
• « of the next item to be fetched
• Data travels one way (unidirectional)
Data (bus)
Two from:
• Carries / transports data / example of data ...
• « that is currently being processed // that will be / has been processed
• Data can travel in both directions (bidirectional)
Control (bus)
Two from:
• Carries / transports signals
• Control / directs the actions of the CPU / processor
• Can be either Unidirectional or Bidirectional
7 5
8 • Secondary 6
• HDD/SSD
• SSD/HDD
• Primary
• ROM/RAM
• RAM/ROM
9 1 mark for appropriate device name and 1 further mark for appropriate 6
purpose.
Input devices
Two from:
• Keypad / Keyboard «
• « e.g. to allow customer to input the quantity of an item
• Touchscreen «
• « e.g. to allow a customer to select a payment method
• Barcode scanner / Barcode reader «
• « e.g. to allow a customer to scan in their shopping
• Card reader // Cash deposit / intake «
• « e.g. to allow a customer to pay for their shopping
• Weighing scales «
• « e.g. to allow a customer to weigh fresh produce
Output devices
One from:
• Display / Touchscreen «
• « e.g. to allow a customer to see the running total of their shopping
• Speaker «
• « e.g. to give audio instructions to a customer about how to use the
self-checkout
• Printer «
• « e.g. to print a receipt for the customer
A B Output
0 0 1
0 1 0
1 0 0
1 1 0
• (A AND B)
• AND
• (C OR NOT B)
12(a) 1 mark for appropriate sensor and 1 further mark for appropriate use. 4
Two from:
• Gas (sensor) «
• « e.g. to measure the levels of oxygen/carbon dioxide / nitrogen in the
factory to make sure they are not too high / low
• Temperature (sensor) «
• « e.g. to measure the temperature of the chemicals to make sure it is
not too high/low
• Motion / Infra-red (sensor) «
• « e.g. to detect any persons in an unauthorised area of the factory
• Pressure (sensor) «
• « e.g. to measure the pressure of chemicals flowing through pipes to
check that level are not too high / low
• pH (sensor) «
• « to measure the pH to make sure the acidity / alkalinity of the
chemicals is correct
• Light (sensor) «
• « to measure the level of light to make sure it remains at a constant
level for the chemical process
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (SLM) 135989
© UCLES 2016 [Turn over
1 To process an instruction, a central processing unit (CPU) goes through a cycle that has three
main stages.
Stage 1 ................................................................................
Stage 2 ................................................................................
Stage 3 ................................................................................
[3]
2 Name each of the potential security issues described in the five statements below:
[5]
Parallel, half-duplex
data transmission
An even or odd number of bits set to 1
in a byte, used to check if the byte has
been transmitted correctly
[5]
© UCLES 2016 2210/13/O/N/16 [Turn over
Page 182 of 400
Muhammad Qadeer (0333-8136280)
4 www.cs2210.blogspot.com
(a) Staff currently use a keyboard to input a customer food order into a computer. The food order
is then sent to the kitchen.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(b) A concept keyboard has a flat surface that is overlaid with images of food items available
from the restaurant menu. Staff can click on an image to add the food item to a customer food
order.
The Henslows Diner wants to change to a concept keyboard to input customer food orders.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
(c) The Henslows Diner stores personal data on a computer. This computer is connected to the
Internet to allow the data to be backed up.
There is currently one security method in place to protect the data on the computer from
unauthorised access. This is a password.
Give two other security methods that could be added to improve the security of the data.
Describe how each method will keep the data safe.
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
5 Three switches, A, B and C, each send values of 0 or 1 to a logic circuit. Value X is output from the
logic circuit.
Switch A
Switch B Logic circuit Output X
Switch C
OR
B X
[5]
(b) Complete the truth table for the conditions given at the start of question 5.
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
(c) A microprocessor regularly samples the output, X. Each sample value is stored in an 8-bit
register as shown below. One bit of this register is reserved as a parity bit.
1 1 1 1 1 0 0 1 Register Y
0 1 0 1 1 1 1 1 Register Z
Register .............................................[1]
(d) When eight bytes of data have been collected, they are transmitted to a computer 100 km
away. Parity checks are carried out to identify if the data has been transmitted correctly. The
system uses even parity and column 1 is the parity bit.
The eight bytes of data are sent together with a ninth parity byte:
byte ...............................................................................................................................[1]
column ...........................................................................................................................[1]
(iii) The incorrect bit is indicated where the byte number and column cross.
[1]
...........................................................................................................................................
.......................................................................................................................................[1]
(v) Considering the fault condition given in part (c), explain why it is very important that the
incorrect bit is located and corrected.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
© UCLES 2016 2210/13/O/N/16
State two advantages of using a high-level language and two advantages of using a low-level
language.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[4]
7 Modern Liquid Crystal Display (LCD) monitors use Light-Emitting Diode (LED) backlit technology.
1 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
4 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[4]
Draw lines to indicate which descriptions refer to a compiler and which descriptions refer to an
interpreter.
Description
[4]
Describe how the sensors and microprocessor interact to switch on the security light when an
intruder is detected.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
10 (a) A manufacturer of aeroplane engines assigns a denary identification number (ID) to each
engine.
[2]
...........................................................................................................................................
...........................................................................................................................................
[3]
(b) The current status of the engine is sent to a computer in the aeroplane.
Each piece of data collected is 8 bytes in size. Data collection occurs every 30 seconds.
Calculate the number of kilobytes that would be needed to store the data collected during a
10-hour flight. Show your working.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
................................................. kilobytes
[3]
(c) At the end of the flight, all of the data are sent to the aeroplane engine manufacturer using the
Internet.
...................................................................................................................................................
...................................................................................................................................................
IP address .................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
(d) When sending this data, security is very important. Data are sent over the Internet using
Transport Layer Security (TLS) protocol.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the October/November 2016 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level
components.
1 In any order:
– Fetch
– Decode
– Execute [3]
2 – Hacking
– Virus
– Cookies
– Cracking
– Pharming [5]
© UCLES 2016
[5]
© UCLES 2016
– Encryption
– If the data is accessed or stolen it will be meaningless
– Biometric device
– Can help prevents unauthorised access to the system (only award once)
– Firewall
– Can alert to show unauthorised access attempt on the system
– Can help prevent unauthorised access to the system (only award once)
– Can help protect against viruses and malware entering the system
– Anti-spyware
– Can stop the keys being logged that, when analysed, would reveal the password to
the data [4]
© UCLES 2016
B X
[5]
A B C Working space X
0 0 0 0
0 0 1 0
0 1 0 1
0 1 1 0
1 0 0 1
1 0 1 1
1 1 0 1
1 1 1 0
[4]
© UCLES 2016
© UCLES 2016
© UCLES 2016
10 (a) (i) 2 marks for 3 correct binary conversions, 1 mark for 2 correct binary conversions [2]
0 0 0 1 1 0 1 0 1 1 1 1
1AF [3]
Working
– 1200 × 8 = 9600 (bytes)
– 9600/1024
Answer
– 9.4 kilobytes [3]
MAC address
IP address
© UCLES 2016
NOTE: Answer must refer to the importance of ethics and be more than a description of
ethics. [6]
© UCLES 2016
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (AL) 135539
© UCLES 2016 [Turn over
1 (a) Give two reasons why a programmer would choose to write code in a low-level language.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
(b) High-level languages require either an interpreter or a compiler to translate the program.
Tick (3) to show which statements refer to interpreters and which refer to compilers.
[5]
1 .......................................................................................................................................................
2 .......................................................................................................................................................
3 .......................................................................................................................................................
4 .......................................................................................................................................................
[4]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(b) A computer in a factory is connected to a printer. The printer is located in an office 1 km away
from the factory.
Identify which data transmission method would be most suitable for this connection.
...................................................................................................................................................
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
4 Nine bytes of data are transmitted from one computer to another. Even parity is used. An additional
parity byte is also sent.
byte 1 1 1 1 0 1 1 1 0
byte 2 0 0 0 0 0 1 0 1
byte 3 0 1 1 1 1 0 0 0
byte 4 1 1 0 0 0 0 0 0
byte 5 1 0 1 1 1 1 1 0
byte 6 0 1 0 1 1 0 0 1
byte 7 0 1 1 1 0 0 1 1
byte 8 0 0 1 1 0 1 1 0
byte 9 1 1 0 0 0 0 1 1
parity byte 0 0 1 0 0 0 1 0
(a) Circle the corrupt bit in the corrupt byte in the table above. [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
128 64 32 16 8 4 2 1
0 1 1 1 0 0 0 0
...............................................................................................................................................[1]
(b) All the bits in the register are shifted one place to the right as shown below.
0 1 1 1 0 0 0 0
0 0 1 1 1 0 0 0
...............................................................................................................................................[1]
(c) State the effect the shift to the right had on the original denary number from part (a).
...............................................................................................................................................[1]
(d) The original number in part (a) is shifted three places to the right.
[1]
.......................................................................................................................................[1]
(e) Describe the problems that could be caused if the original binary number in part (a) is shifted
five places to the right.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
Control unit
Fetches each instruction in turn
[4]
7 (a) Complete the truth tables and name the single logic gate that could replace each logic circuit:
(i)
Working space
A A B X
X
B 0 0
0 1
1 0
1 1
(ii)
A Working space
A B X
X 0 0
0 1
B 1 0
1 1
(b) (i) Draw a logic circuit to represent the following logic statement:
B X
[4]
(ii) Complete the truth table for the logic statement in part (b)(i).
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
8 Identify whether the four statements about file compression are correct by writing TRUE or FALSE
in the following table.
MP3 files are, on average, 90% smaller than the music files
stored on a CD
[4]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) Name and describe two other potential security threats when using the Internet.
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
http://www.cie.org.uk/ComputerSciencePapers
Protocol ....................................................................................................................................
[3]
(b) Identify two sensors that the security system could use to detect intruders.
Sensor 1 ...................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Sensor 2 ...................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the October/November 2016 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level
components.
(b)
Statements Interpreter (9) Compiler (9)
[5]
© UCLES 2016
serial
parallel
(b) – serial
© UCLES 2016
(b) 56 [1]
(d) (i)
0 0 0 0 1 1 1 0
[1]
(ii) 14 [1]
© UCLES 2016
[4]
© UCLES 2016
A B Working space X
0 0 0
0 1 0
1 0 0
1 1 1
AND gate
[3]
A B Working space X
0 0 0
0 1 1
1 0 1
1 1 1
OR gate
[3]
© UCLES 2016
1 mark
1 mark
1 mark
[4]
(ii) 4 marks for 8 correct outputs
3 marks for 6 correct outputs
2 marks for 4 correct outputs
1 mark for 2 correct outputs
A B C Working space X
0 0 0 0
0 0 1 1
0 1 0 0
0 1 1 0
1 0 0 0
1 0 1 1
1 1 0 1
1 1 1 1
[4]
© UCLES 2016
8
Statement TRUE or FALSE
MP3 files are, on average, 90% smaller than the music files
TRUE
stored on a CD
[4]
(b) 1 mark for each security threat and 1 mark for matching description
[4]
© UCLES 2016
(b)
Protocol: http(://)
(b) 1 mark for identification of each sensor, max 2 for each description
Infrared/motion sensor
Pressure sensor
© UCLES 2016
NOTE: The question asks candidates to explain the differences, so each mark needs to have a
comparison.
[4]
© UCLES 2016
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (CW/JG) 127298
© UCLES 2016 [Turn over
1 Complete the following by writing either compiler, interpreter or assembler in the spaces
provided.
Name three other sensors that could be used in the following applications.
Application Sensor
[3]
4AF
[3]
(b) The 2016 Olympic Games will be held in Rio de Janeiro. A timer that counts down to the
opening of the Games is shown on a microprocessor-controlled display.
The number of hours, minutes and seconds until the Games open are held in three 8-bit
registers.
0 1 1 0 1 0 0 1 105 hours
0 0 1 0 0 0 0 0 32 minutes
0 0 0 1 0 1 0 0 20 seconds
(i) Show the values in each 8-bit register 30 seconds after the time shown above:
hours
minutes
seconds
[3]
(ii) Write the hexadecimal value of the minutes register from part (b)(i).
.......................................................................................................................................[1]
(a) Describe how the size of the text file can be reduced.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(b) This file will be transmitted to Mashuda as an email attachment. Mashuda then stores it on
her computer.
Explain how checksums can be used to verify that the file has not been corrupted during
transmission or data storage.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
Description Device
[5]
• type of transmission
• method of transmission
Description 1:
Tick Tick
Type Method
(✓) (✓)
Data is transmitted several bits at
a time down several wires in both simplex serial
directions simultaneously.
half-duplex parallel
full-duplex
Description 2:
Tick Tick
Type Method
(✓) (✓)
Data is transmitted in one direction
only, one bit at a time, down a simplex serial
single wire.
half-duplex parallel
full-duplex
Description 3:
Tick Tick
Type Method
(✓) (✓)
Data is transmitted one bit at a
time down a single wire; the data simplex serial
is transmitted in both directions
but not at the same time.
half-duplex parallel
full-duplex
[6]
(b) Give two reasons why serial transmission, rather than parallel transmission, is used to
connect devices to a computer.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
7 (a)
;
%
&
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
% ;
&
[5]
(c) Re-draw the following logic circuit using NAND gates only.
&
% ;
&
[4]
8 (a) Five statements and three types of software are shown below.
Draw lines to connect each statement with the correct type of software.
Free software
Shareware
[3]
(b) Describe three ethical issues that should be considered when using computers.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
Viruses: .....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Pharming: .................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Spyware: ...................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
(a) Write the binary numbers that would be produced from this barcode:
%LQDU\QXPEHU$ %LQDU\QXPEHU%
Binary number A:
Binary number B:
[2]
Write the parity bit for each of the binary numbers in part (a):
Parity bit
Binary number A:
Binary number B:
[2]
© UCLES 2016 2210/12/M/J/16
Complete the table below by writing the correct storage device or media in the box next to each
description.
Optical storage media that uses a single spiral track and uses
dual layer technology, allowing high data storage capacity.
[6]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2016 series for most Cambridge IGCSE®,
Cambridge International A and AS Level components and some Cambridge O Level components.
1 compiler
assembler
interpreter [3]
2
Application Sensor
(ii) 1F [1]
5
Description Device
6 (a)
Tick Tick
Type Method
() ()
simplex serial
half-duplex parallel
full-duplex
Tick Tick
Type Method
() ()
simplex serial
half-duplex parallel
full-duplex
Tick Tick
Type Method
() ()
simplex serial
half-duplex parallel
full-duplex
[6]
7 (a)
A B C Working space X
0 0 0 0
0 0 1 1
0 1 0 0
0 1 1 1
1 0 0 0
1 0 1 1
1 1 0 1
1 1 1 0
(b) 1 mark for each correct gate with correct source of input
X
B
[5]
B X
C
[4]
NOTE: all statements that are correct must be connected to the correct type of
software for the mark to be awarded
Free software
Shareware
Viruses:
– program/software/file that replicates (copies) itself
– intends to delete or corrupt files//fill up hard disk space
Pharming:
– malicious code stored on a computer/web server
– redirects user to fake website to steal user data
Spyware:
– monitors and relays user activity e.g. key presses//key logging software
– user activity/key presses can be analysed to find sensitive data e.g. passwords [6]
9 (a)
Binary number A: 1 1 1 0 0 1 0
Binary number B: 1 0 0 1 1 1 0
[2]
(b)
Parity Bit
Binary number A 1
Binary number B 1
[2]
Blu-ray disc
RAM
DVD-RAM
[6]
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (ST/CGW) 126907
© UCLES 2016 [Turn over
Tick (✓) the appropriate boxes in the table below to show which features apply to these three
types of software.
[3]
...............................................................................................................................................[1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
Sensor Application
Light
Monitor the pollution levels in a river
sensor
(b) Automatic doors in a building are controlled by the use of infrared sensors and a
microprocessor.
Describe how the sensors and the microprocessor are used to automatically open a door as
a person approaches.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
4 (a) Nikita wishes to print out some documents and connects her printer to the computer using
one of the USB ports.
.......................................................................................................................................[1]
1 .......................................................................................................................................
...........................................................................................................................................
2 .......................................................................................................................................
...........................................................................................................................................
3 .......................................................................................................................................
...........................................................................................................................................
[3]
(iii) The printer runs out of paper while it is printing the documents. A signal is sent to the
processor to request that the problem is dealt with.
.......................................................................................................................................[1]
(b) State one suitable application for each printer below. A different application must be given for
each printer.
...................................................................................................................................................
3D printer ..................................................................................................................................
...................................................................................................................................................
[2]
(c) Name another type of printer and describe one way in which it is different from the printers
named in part (b).
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Application ................................................................................................................................
...................................................................................................................................................
[3]
5 A computer-controlled machine produces plastic sheets. The thickness of each sheet must be
within a certain tolerance. The sheets are kept below 50 °C as they move over rollers at 10 metres
per second.
Binary
Parameter Description Conditions
value
1 thickness of sheet in tolerance
D sheet thickness
0 thickness of sheet out of tolerance
1 roller speed = 10 metres/second
S roller speed
0 roller speed <> 10 metres/second
1 temperature < 50 °C
T temperature
0 temperature >= 50 °C
thickness is in tolerance AND (roller speed <> 10 metres/second OR temperature >= 50 °C)
OR
S X
[6]
Working Space
D S T X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
6 Secure socket layer (SSL) is used in the security of information on Internet websites.
(a) State how it is possible for a user to know that a website is secure by looking at the web
address.
...................................................................................................................................................
...............................................................................................................................................[1]
(b) Describe three of the stages a web browser goes through to detect whether a website is
secure.
1 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
7 Each seat on a flight is uniquely identified on an LCD above the seat. For example, seat 035C is
shown as:
The first three characters are digits that represent the row.
The fourth character is the seat position in that row. This is a single letter, A to F, that is stored as a
hexadecimal value.
Each of the four display characters can be stored in a 4-bit register. For example, 0 and C would
be represented as:
8 4 2 1
0: 0 0 0 0
C: 1 1 0 0
(a) Show how the 4-bit registers would store the remaining two characters, 3 and 5.
[2]
0 0 0 1
1 0 0 1
0 1 0 0
1 1 1 0
[2]
8 A bank offers an online service to its customers. The bank has developed a “SafeToUse” system
that asks each customer to enter four randomly chosen characters from their password each time
they log in.
The customer selects these four characters from drop-down boxes. For example:
5th character
6th character
8th character
(a) (i) Explain why it is more secure to use drop-down boxes rather than entering characters
using a keyboard.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(ii) Give a reason why the system asks for four characters chosen at random.
...........................................................................................................................................
.......................................................................................................................................[1]
1 ...............................................................................................................................................
2 ...............................................................................................................................................
[2]
A 7-digit number has an extra digit on the right, called the check digit.
digit position: 1 2 3 4 5 6 7 8
digit: – – – – – – – –
check digit
(a) Calculate the check digit for the following number. Show all your working.
4 2 4 1 5 0 8 …
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 2 4 0 0 4 5 X
Circle below correct if the check digit is correct OR incorrect if the check digit is incorrect.
correct incorrect
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
[5]
• DVD-RW
• DVD-RAM
• CD-ROM
• Blu-ray disc
Tick (✓) the appropriate boxes in the table to indicate which of the features apply to each
example of optical storage media.
DVD-RW
DVD-RAM
CD-ROM
Blu-ray disc
[4]
(b) Solid state drives (SSD) are replacing hard disc drives (HDD) in some computers.
1 .......................................................................................................................................
...........................................................................................................................................
2 .......................................................................................................................................
...........................................................................................................................................
3 .......................................................................................................................................
...........................................................................................................................................
[3]
(ii) Explain why many web servers still use hard disc drive (HDD) technology.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
...............................................................................................................................................[1]
(b) The barcode in part (a) contains the denary value 2640
Convert this value to hexadecimal.
...................................................................................................................................................
...................................................................................................................................................
[4]
(c) An airport uses the type of barcode shown in part (a) to advertise local places of interest.
Describe how a visitor landing at the airport could use these barcodes to help plan their visit.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
BLANK PAGE
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2016 series for most Cambridge IGCSE®,
Cambridge International A and AS Level components and some Cambridge O Level components.
– hardware/physical address
– unique address/number associated (with network card in) a device/computer
– usually 48/64 bits (12/16 hex digits)
– first 6/8 digits = manufacturer code/ID of device (NIC)
– last 6/8 digits = serial number of device (NIC) [3]
3 (a)
Light
sensor Monitoring the pollution levels in a river
(c) 1 mark for naming printer + 1 mark for description + 1 mark for application
Laser printer
5 (a) 1 mark for each correct gate, with correct source of input(s)
[6]
(b)
D S T Working Space X
0 0 0 0
0 0 1 0
0 1 0 1
0 1 1 0
1 0 0 1
1 0 1 1
1 1 0 1
1 1 1 0
3 0 0 1 1
5 0 1 0 1
[2]
(b)
0 0 0 1 1
1 0 0 1 9 1 mark
0 1 0 0 4
1 1 1 0 E 1 mark
[2]
– fingerprint scanner
– face recognition software
– retina scanner/iris scanner
– voice recognition software [2]
9 (a) 1 mark for correct check digit and 1 mark for showing the calculation
(4 × 1) + (2 × 2) + (4 × 3) + (1 × 4) + (5 × 5) + (0 × 6) + (8 × 7)
1 mark for any correct
line of working
= 4 + 4 + 12 + 4 + 25 + 0 + 56 = 105
105/11 = 9 remainder 6
10
DVD-RW 1 mark
DVD-RAM 1 mark
CD-ROM 1 mark
[4]
(b) – A 5 0 (1 mark)
1 0 1 0 0 1 0 1 0 0 0 0
- visitor scans the QR code with (the camera on) the mobile device
- App is used to read/interpret the QR code
- links to a website/opens a document …
- … to access local tourist information
- can store the QR code to refer to again for the information [3]
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
1 (a) Name an application which makes use of the following sensors. A different application should
be used in each case.
Temperature .............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Motion .......................................................................................................................................
...................................................................................................................................................
[3]
(b) The flowchart on the opposite page shows how a light sensor and microprocessor are used
to switch a street lamp on or off. When the sensor reading is <= 50 light units, the lamp is
turned on automatically.
Using item numbers only from the list below, complete the flowchart:
Item
Instruction
number
4 Is time = 0?
[5]
START
Read light
sensor
Yes
No
No
No
Time set to 10
minutes
Count down in
minutes
2 Sensors and a microprocessor monitor a car exhaust for high temperature and high carbon
monoxide (CO) levels.
(a) Describe how the sensors and microprocessor are used to monitor the temperature and CO
levels and warn the driver if either is out of range.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
(b) The information from seven sensors is sent to an engine management system in the car. The
status of each sensor is stored in an 8-bit register; a value of 1 indicates a fault condition:
(i) Identify the fault condition(s) that the following register indicates:
0 0 1 0 0 1 0 1
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
1 1 1 0 0 1 0
0 0 0 1 1 1 0
[2]
(iii) A car has a faulty airbag and the CO level is too high.
[2]
(iv) Give the hexadecimal value of the binary number shown in part (iii).
...........................................................................................................................................
.......................................................................................................................................[1]
Address Contents
1000 0000 0110 1110
1000 0001 0101 0001
1000 0010 1000 1101
1000 0011 1000 1100
1000 1100
1000 1101
1000 1110
1000 1111
(a) (i) The contents of memory location 1000 0001 are to be read.
Show the contents of the Memory Address Register (MAR) and the Memory Data
Register (MDR) during this read operation:
MAR
MDR
[2]
(ii) The value 0111 1001 is to be written into memory location 1000 1110.
Show the contents of the MAR and MDR during this write operation:
MAR
MDR
[2]
(iii) Show any changes to the computer memory following the read and write operations in
part (a)(i) and part (a)(ii).
Address Contents
1000 0000 0110 1110
1000 0001 0101 0001
1000 0010 1000 1101
1000 0011 1000 1100
1000 1100
1000 1101
1000 1110
1000 1111
[1]
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
“It allows a user to have the freedom to run, copy, change and adapt the software and
then pass it on to a colleague, friend or family member.”
...................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [3]
(b) The four statements below refer to firewalls and proxy servers.
Tick (9) the appropriate column(s) to indicate whether the statement refers to a firewall
and/or a proxy server.
[4]
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
5 A security system records video footage. One minute of video requires 180 MB of storage. The
recording system can store several hours of video footage.
(a) Name and describe a suitable storage device for this recording system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
(b) Calculate how much storage would be needed for 2 hours of video footage.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
6 Passengers fly into an airport from other countries. The airport has a security system that uses:
• computers
• scanners
• digital cameras
To gain entry to the country, each passenger must have a passport or identification (ID) card. This
must contain a recent photograph and other personal data. The passenger must:
• place their passport or ID card on a scanner that reads machine-readable characters and
scans the photograph
• look towards a camera that takes an image of the passenger’s face
Describe how a computer checks whether the image just taken by the camera matches the
scanned photograph.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[2]
7 Name a suitable output device for each of the following applications. A different device should be
used for each application.
[5]
Give an application which makes use of each device and state a reason why the device is
appropriate for that application.
Application .............................................................................................
Reason ..................................................................................................
Light sensor
................................................................................................................
................................................................................................................
Application .............................................................................................
Reason ..................................................................................................
Keyboard
................................................................................................................
................................................................................................................
Application .............................................................................................
Reason ..................................................................................................
Barcode reader
................................................................................................................
................................................................................................................
Application .............................................................................................
Reason ..................................................................................................
Touch screen
................................................................................................................
................................................................................................................
[8]
...................................................................................................................................................
How many MP3 files of the size calculated above could be stored on an 800 MB CD?
...................................................................................................................................................
[2]
(b) (i) Explain how MP3 files retain most of the original music quality.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [2]
...................................................................................................................................... [1]
...................................................................................................................................... [1]
10 Choose five correct terms from the following list to complete the spaces in the sentences below:
• cypher text
• encryption algorithm
• encryption key
• firewall
• plain text
• proxy server
• symmetric encryption
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the October/November 2015 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.
1 (a) Temperature
– central heating / air con system
– greenhouse environment
– a chemical reaction / process
Magnetic field
– anti-lock brakes on a car
– detection of motor vehicles (e.g. at traffic lights)
– reading magnetic ink characters on cheques
– geophysical surveys
Motion
– automatic doors
– burglar alarm [3]
(b)
START
Read light
sensor
6
1 mark
Yes
2
1 mark
No
No
No
Time set to 10
minutes
9/7
1 mark
8
7/9
1 mark
Count down in
minutes 1
1 mark
Yes No No Is time Yes
4 = 0?
[5]
(b) (i) 2 marks for all correct conditions, 1 mark for 2 correct conditions
1 1 1 1 0 0 1 0
0 0 0 0 1 1 1 0
[2]
(iii) 1 mark for correct parity bit + 1 mark for remainder of binary value
1 0 1 0 0 0 1 0
[2]
3 (a) (i)
MAR 1 0 0 0 0 0 0 1
MDR 0 1 0 1 0 0 0 1
[2]
(ii)
MAR 1 0 0 0 1 1 1 0
MDR 0 1 1 1 1 0 0 1
[2]
(iii)
Address Contents
1000 0000 0110 1110
1000 0001 0101 0001
1000 0010 1000 1101
1000 0011 1000 1100
1000 1100
1000 1101
1000 1110 0111 1001
1000 1111
[1]
[4]
(c) one mark for method + one mark for linked reason (maximum 6 marks)
– back up files«
– «on a regular basis / to another device / to the cloud
(1 mark for correct answer and 1 mark for correct calculation) [2]
[5]
8 1 mark for each named application + 1 mark for each matching reason for choice
Automatic doors
– detects a person when light beam broken and opens doors
Greenhouse
– ensures correct lighting conditions for growth of plants
Word processor / spreadsheet / database
– need to key in data manually (e.g. report writing)
Keyboard
Control room interface
– need to manually key in data (e.g. flow speed of liquid)
Supermarket checkout
– read barcodes to find prices, description
– allows automatic stock control
Airport check-ins
– barcodes on luggage to track whereabouts
Ticket / information kiosk
– easy method for public to enter data
– limited number of options
[8]
9 (a) 8 MB
100 [2]
10 symmetric encryption
encryption key
plain text
encryption algorithm
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
1 There are a number of security risks associated with using the Internet.
Name three of these risks. For each, state why it is a risk and describe how the risk can be
minimised.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[9]
Draw a line to link each computer term to its most appropriate description.
3 The flowchart on the opposite page shows what happens when the barcode on a product is
scanned at the checkout in a supermarket. The barcodes are used in an automatic stock control
system.
Using item number only from the list below, complete the flowchart.
Item
Statement
number
4 Has the re-order flag already been added to the product record?
START
Barcode on product
is scanned END
No
No
Yes
Yes
No Any more
barcodes
to scan? No
Yes
Yes
END
No
[4]
4 (a) (i) Convert the following two hexadecimal numbers into binary:
FA7
D3E
FA7
D3E
[4]
(ii) Now perform the AND (logic) operation on each corresponding pair of binary bits in the
two numbers from part (i).
[2]
...........................................................................................................................................
...........................................................................................................................................
[2]
(b) (i) The following code shows HTML ‘tag’ pairs on either side of the text stating the colour
that each creates.
Yellow is a combination of red and green, magenta a combination of red and blue and
cyan a combination of green and blue.
State what 6-digit hexadecimal values should replace X, Y and Z in the above code.
X ........................................................................................................................................
Y ........................................................................................................................................
Z ........................................................................................................................................
[3]
(ii) Describe how other colours, such as a darker shade of blue, are created.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
(i) Identify what the first six and last six hexadecimal digits represent.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
...........................................................................................................................................
...........................................................................................................................................
[1]
5 A security system uses sensors, a camera and a microprocessor to capture images of each person
entering a large shopping mall.
(a) Describe how the sensors, camera and microprocessor interact to identify certain people
entering the mall.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[5]
(b) Each image taken requires 1 MB of storage. If the camera captures an image every 5 seconds
over a 24 hour period, how much storage is required?
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
(c) The shopping mall has over 100 cameras. At the end of each day all these cameras send
their images, captured over the last 24 hours, to a central computer.
Explain why the mall uses dedicated fibre optic cable rather than transmitting the data over
the local broadband network.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
Structure ....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Presentation ..............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
7 (a) Check digits are used to ensure the accuracy of input data.
A 7-digit code number has an extra digit on the right, called the check digit.
Digit position 1 2 3 4 5 6 7 8
Digit – – – – – – – –
(i) Calculate the check digit for the following code number. Show all your working.
4 2 4 1 5 0 8 …
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
3 2 4 0 0 4 5 X
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
(b) When data are transmitted from one device to another, a parity check is often carried out on
each byte of data. The parity bit is often the leftmost bit in the byte.
(i) If a system uses even parity, give the parity bit for each of the following bytes:
parity bit
1 1 0 0 1 1 0
parity bit
0 0 0 0 0 0 1
[2]
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[1]
8 The steps to print a document using a laser printer are shown in the table below.
Put each step in the correct order. The first step has been done for you.
Step Order
As the printing drum rotates, a laser scans across it; this removes the
positive charge in certain areas
The printing drum is coated in positively-charged toner; this then sticks to the
negatively-charged parts of the printing drum
The paper goes through a fuser which melts the toner so it fixes permanently
to the paper
The printer driver ensures that the data is in a format that the laser printer
can understand 1
Data is then sent to the laser printer and stored temporarily in the printer
buffer
The toner on the printing drum is now transferred to the paper to reproduce
the required text and images
[8]
© UCLES 2015 2210/12/O/N/15 [Turn over
Page 314 of 400
Muhammad Qadeer (0333-8136280)
12 www.cs2210.blogspot.com
9 A remote-controlled model car contains RAM, ROM and a solid state drive. The car receives
radio signals from its remote control. It can only receive radio signals of a certain frequency. The
manufacturer sets this frequency and the owner cannot change it. The owner of the model car can
input their own sequence of movements from an interface underneath the car.
(a) Describe the purpose of each of the three types of memory supplied with the car.
RAM ..........................................................................................................................................
...................................................................................................................................................
ROM .........................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
(b) The owner needs to be able to enter their own sequence of movements for the model car.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
(c) Explain why the model car uses a solid state drive rather than another type of secondary
storage.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the October/November 2015 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.
1 1 mark for each risk + 1 mark for corresponding reason why it is a risk and 1 mark for method
of minimisation
Risk: hacking
Reason: illegal/unauthorised access to data
deletion/amendment of data
Minimised: use of passwords/user ids
use of firewalls
encrypt data/encryption
Risk: virus
Reason: can corrupt/delete data
cause computer to crash/run slow
can fill up hard drive with data
Minimised: use of /run anti-virus (software)
do not download software or data from unknown sources
Risk: phishing
Reason: link/attachments takes user to fake/bogus website
website obtains personal/financial data
Minimised: do not open/click emails/attachments from unknown sources
some firewalls can detect fake/bogus websites
Risk: pharming
Reason: redirects user to fake/bogus website
redirection obtains personal/financial data
Minimised: only trust secure websites, e.g. look for https
check the URL matches the intended site
Risk: cracking
Reason: illegal/unauthorised access to data
Minimised: setting strong passwords
encrypt data/encryption
There may be other valid answers given that are outside the provided mark scheme.
[9]
2
Interface Reduction of file size by permanently
removing certain, redundant information
from the file
Interrupt
File compression format designed to make
photo files smaller in size for storage and
for transmission
JPEG
File compression system for music which
does not noticeably affect the quality of the
sound
Lossless
compression Hardware component that allows the user
to communicate with a computer or
operating system
[6]
3
[4]
START
barcode on product is
scanned END
No
Yes
barcode is looked up
in stock database
2
1 mark
No
3 7
Yes
1 mark
6
Yes
No any more
5 barcodes
No
to scan?
1 mark Yes
Yes
4 END
No
1/8
1 mark
8/1
[4]
4 (a) (i) For each hex number, 2 marks if all correct, 1 mark for 2 correct conversions
F A 7: 1 1 1 1 1 0 1 0 0 1 1 1
D 3 E: 1 1 0 1 0 0 1 1 1 1 1 0
[4]
(ii) 2 marks if all correct, 1 mark for 2 correct conversions – Follow through
1 1 0 1 0 0 1 0 0 1 1 0
[2]
(iii) 2 marks if all correct, 1 mark for 2 correct conversions – Follow through
D26 [2]
(Y) FF 00 FF
(Z) 00 FF FF [3]
(ii) – hex values between 0 to F are combined together to create a hex code
– different combinations in hex codes will create different shades/tones/colours [2]
either
– microprocessor compares the image/video with stored images/video«
– « if person detected = stored image «
– «alert given to signal a person has been identified
or
– microprocessor compares the biometric data from an image/video with stored biometric
data for images/video «
– « if biometric data matched = stored data «
– « alert given to signal a person has been identified
(b) Structure:
– instructs how the layout of the content is displayed
Presentation:
– instructs how the content will be formatted e.g. colour/style/CSS [2]
7 (a) (i) 1 mark for correct check digit and 1 mark for showing the calculation
(4 × 1) + (2 × 2) + (4 × 3) + (1 × 4) + (5 × 5) + (0 × 6) + (8 × 7)
= 4 + 4 + 12 + 4 + 25 + 0 + 56 = 105
105/11 = 9 remainder 6
(ii) 1 mark
– No/incorrect check digit
2 marks
– Total is 78
– 78/11 «
– « gives 7 remainder 1
– check digit should be 1 [3]
parity bit
0 1 1 0 0 1 1 0
parity bit
1 0 0 0 0 0 0 1
[2]
8 1 mark for each step in correct order. (NOTE: Marks can be awarded for a correct sequence.)
As the printing drum rotates, a laser scans across it; this removes the
positive charge in certain areas 4
The printing drum is coated in positively-charged toner; this then sticks to
the negatively-charged parts of the printing drum 6
The paper goes through a fuser which melts the toner so it fixes
permanently to the paper 9
The printer driver ensures that the data is in a format that the laser printer
can understand (1)
A negatively-charged sheet of paper is then rolled over the printing drum 7
Data is then sent to the laser printer and stored temporarily in the printer
buffer 2
The toner on the printing drum is now transferred to the paper to
reproduce the required text and images 8
The printing drum is given a positive charge 3
Negatively-charged areas are then produced on the printing drum; these
match exactly with the text and images to be printed 5
[8]
9 (a) RAM
– contains instructions/program/data currently in use
ROM
any one from:
– contains the start-up/bootstrap program
– contains/stores the setting for frequency (can’t be changed)
Device:
– touch screen
– key pad (NOT keyboard)
Reason:
– easy to use interface
– limited number of options
– small space/space is limited
– other devices such as mouse, keyboard, trackerball, « not suitable [2]
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The maximum number of marks is 75.
DC (RW) 111393
© UCLES 2015 [Turn over
1 (a) Four statements about cookies are shown in the table below.
(b) Five descriptions and five security issues are shown below.
[4]
2 The majority of mobile phones use touch screens. Three common technologies are used by
different mobile phone manufacturers.
• resistive
• capacitive
• infrared
(i) Describe how your chosen technology works to allow a user to make selections by touching
the screen.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(ii) Give one benefit and one drawback of your chosen technology when used on mobile phone
touch screens.
Benefit
...................................................................................................................................................
...................................................................................................................................................
Drawback
...................................................................................................................................................
...................................................................................................................................................
[2]
3 Four input devices, four descriptions and four applications are shown below.
Draw a line to connect each input device to its correct description. Then connect each description
to its correct application.
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[1]
(b) The following stages take place when a user wishes to access a secure website.
Put each stage in sequence by writing the numbers 1 to 6 in the column on the right. The first
one has been done for you.
Sequence
Stage
number
the encrypted data is then shared securely between the web browser
and the web server
the web server sends the web browser a copy of its SSL certificate
the web server will then send back some form of acknowledgement to
allow the SSL encrypted session to begin
5 Parity checks are often used to check for errors that may occur during data transmission.
Tick (✓) to show whether the following three bytes have been transmitted correctly or
incorrectly.
11001000
01111100
01101001
[3]
(b) A parity byte is used to identify which bit has been transmitted incorrectly in a block of data.
The word “F L O W C H A R T” was transmitted using nine bytes of data (one byte per
character). A tenth byte, the parity byte, was also transmitted.
The following block of data shows all ten bytes received after transmission. The system uses
even parity and column 1 is the parity bit.
(ii) Explain how you arrived at your answer for part (b)(i).
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(c) Give the denary (base 10) value of the byte: 1 0111110
...................................................................................................................................................
...............................................................................................................................................[1]
(d) A parity check may not identify that a bit has been transmitted incorrectly.
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[1]
6 A gas fire has a safety circuit made up of logic gates. It generates an alarm (X = 1) in response to
certain conditions.
Binary
Input Description Conditions
value
1 gas pressure is correct
G gas pressure
0 gas pressure is too high
1 carbon monoxide level is correct
C carbon monoxide level
0 carbon monoxide level is too high
1 no gas leak is detected
L gas leak detection
0 gas leak is detected
OR
&
;
[5]
Workspace
G C L X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
A B C
0 0
0 1
1 0
1 1
[1]
7 (a) Street lighting is controlled automatically. A light sensor and a microprocessor are used to
decide when to switch each street light on or off.
Describe how the sensor, microprocessor and light interact to switch the street light on or off.
Include in your answer how the microprocessor stops the street lights being frequently
switched on and off due to brief changes in the light intensity.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
(b) Name three different sensors (other than light and pH) and describe an application for each
of these sensors.
Sensor 1 ...................................................................................................................................
Application ................................................................................................................................
...................................................................................................................................................
Sensor 2 ...................................................................................................................................
Application ................................................................................................................................
...................................................................................................................................................
Sensor 3 ...................................................................................................................................
Application ................................................................................................................................
...................................................................................................................................................
[6]
Software that anyone can download for free from the Internet
and then use without having to pay any fees. The usual
copyright laws apply and a user license is important.
................................................
Software that gives the user the chance to try it out free of
charge before actually buying it. The software is subject to the
usual copyright laws. As a rule, not all the features found in the
full version are available at this stage.
................................................
9 (a) Five statements about interpreters and compilers are shown in the table below.
(b) State why a compiler or an interpreter is needed when running a high-level program on a
computer.
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[1]
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[1]
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[1]
A: 1 0 1 0 1 1 0 1
1 1 0 0 1 1 1 0
1 0 1 1 0 1 1 1
B: LDA X
INC X
STA Y
C: FOR x ← 1 TO 10
READ n
ENDFOR
Identify, using the letters A, B or C, which of the above codes is an example of assembly
code, high-level language code or machine code:
10 Letters from the alphabet are represented in a computer by the following denary (base 10) values:
A = 97
G = 103
I = 105
L = 108
N = 110
(a) Convert each of the five values to binary. The first one has been done for you.
A (97): 0 1 1 0 0 0 0 1
L (108):
I (105):
G (103):
N (110):
[2]
(b) An encryption system works by shifting the binary value for a letter one place to the left. “A”
then becomes:
1 1 0 0 0 0 1 0
This binary value is then converted to hexadecimal; the hexadecimal value for “A” will be:
C 2
For the two letters “L” and “G”, shift the binary values one place to the left and convert these
values into hexadecimal:
hexadecimal
L: .............................................
G: .............................................
[4]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2015 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.
(b)
2 (i) Either of the three options, resistive, capacitive or infra-red must be chosen
maximum of two marks from chosen technology:
resistive
− uses multiple layers of material …
− … that transmit electric currents
− when the top layer/screen is pushed/touched into the lower/bottom layer …
− … the electric current changes and location of “touch” is found
capacitive
− current sent/flows out from all 4 corners of the screen
− when finger/stylus touches screen, the current changes
− the location of “touch” is calculated
infra-red
− an “invisible” grid on the screen (pattern of infra-red LED beams)
− sensors detect where the screen has been touched through a break in an infrared
beam(s)
− the position where the screen touched is calculated [2]
benefits:
− inexpensive/cheap to manufacture
− can use stylus/finger/gloved finger/pen
drawbacks:
− poor visibility in sunlight
− vulnerable to scratching
− wears through time
− does not allow multi-touch facility
capacitive
benefits:
− good visibility in sunlight
− (very) durable surface
− allows multi-touch facility
drawbacks:
− screen (glass) will shatter/break/crack (on impact)
− cannot use when wearing (standard) gloves
infra-red
benefits:
− good durability
− allows multi-touch facility
− can use stylus/finger/gloved finger/pen
drawbacks:
− expensive to manufacture
− screen (glass) will shatter/break/crack (on impact)
− sensitive to dust/dirt [2]
copies paper
barcode documents and voice
reader converts the text and recognition
pictures into a
computer-readable form
detects changes in
pH sensor automatic
acidity levels; data is
stock control
often in analogue form
[6]
(b) 1 mark for each number in the correct order, next to the correct stage.
Sequence
Stage
number
the encrypted data is then shared securely between the web browser and the
6
web server
the web browser attempts to connect to a web site which is secured by SSL (1)
the web server sends the web browser a copy of its SSL certificate 3
the web server will then send back some form of acknowledgement to allow the
5
SSL encrypted session to begin
the web browser checks whether the SSL certificate is trustworthy; if it is then
4
the web browser sends a message back to the web server
[5]
11001000
01111100
01101001
[3]
column number: 6
[2]
(c) 190
[1]
C X
[5]
(b)
G C L Workspace X
0 0 0 0
0 0 1 0
] 1 mark
0 1 0 1
0 1 1 0
] 1 mark
1 0 0 1
1 0 1 1
] 1 mark
1 1 0 1
1 1 1 0
] 1 mark
[4]
A B C
0 0 0
0 1 1
1 0 1
1 1 0
[1]
[5]
(b) 1 mark for correct sensor, 1 mark for its matching application
(all THREE applications must be different)
sensor application
[6]
Freeware
Shareware
Free software
(Computer) Ethics
Plagiarism
[5]
[5]
10 (a) 1 mark for two correct lines, 2 marks for four correct lines
L (108): 0 1 1 0 1 1 0 0
I (105): 0 1 1 0 1 0 0 1
G (103): 0 1 1 0 0 1 1 1
N (110): 0 1 1 0 1 1 1 0
[2]
L: 1 1 0 1 1 0 0 0 D8
G: 1 1 0 0 1 1 1 0 CE
[4]
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (LEG/CGW) 111631
© UCLES 2015 [Turn over
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
Benefit .......................................................................................................................................
...................................................................................................................................................
Benefit .......................................................................................................................................
...................................................................................................................................................
[2]
(c) Give one application of each type of data transmission. Each application must be different.
Application ................................................................................................................................
...................................................................................................................................................
Application ................................................................................................................................
...................................................................................................................................................
[2]
...................................................................................................................................................
...................................................................................................................................................
[1]
(b) Describe two benefits of using USB connections between a computer and a device.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
3 (a) Complete the truth table for the following logic circuit:
Workspace
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
(b) Draw a logic circuit which corresponds to the following logic statement:
B X
[3]
(c) Write a logic statement which corresponds to the following logic circuit:
A
B
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
4 Choose six correct terms from the following list to complete the spaces in the paragraphs below:
• encryption
• file name
• firewall
• HTML tags/text
• IP address
• protocol
• proxy server
• SSL certificate
• web server name
A user enters a URL. The web browser breaks up the URL into three components:
1 ........................................................
2 ........................................................
3 ........................................................
The web browser reads the ............................................................ from the selected page and
used between the computer and web server; this device uses a cache to store the website home
1 2 3 4 5
[10]
6 (a) Viruses, pharming and phishing are all examples of potential Internet security issues.
Virus .........................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Pharming ..................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Phishing ....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
(b) An online bank requires a client to supply an 8-digit code each time they wish to access their
account on the bank’s website.
Rather than ask the client to use a keyboard, they are requested
to use an on-screen keypad (shown on the right) to input the 2 5 1
8-digit code.
6 8 3
The position of the digits on the keypad can change each time
the website is visited. 9 0 4
(i) Explain why the bank has chosen to use this method of entering the 8 digits.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
(ii) Name and describe another measure that the bank could introduce to improve the
security of their website.
Name .................................................................................................................................
Description ........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
7 (a) One of the key features of von Neumann computer architecture is the use of buses.
Bus Description
(b) The seven stages in a von Neumann fetch-execute cycle are shown in the table below.
Put each stage in the correct sequence by writing the numbers 1 to 7 in the right hand column.
The first one has been done for you.
Sequence
Stage
number
the instruction is then copied from the memory location contained
in the MAR (memory address register) and is placed in the MDR
(memory data register)
[6]
8 An alarm clock is controlled by a microprocessor. It uses the 24 hour clock. The hour is represented
by an 8-bit register, A, and the number of minutes is represented by another 8-bit register, B.
(a) Identify what time is represented by the following two 8-bit registers.
A B
128 64 32 16 8 4 2 1 128 64 32 16 8 4 2 1
0 0 0 1 0 0 1 0 : 0 0 1 1 0 1 0 1
[2]
(b) An alarm has been set for 07:30. Two 8-bit registers, C and D, are used to represent the
hours and minutes of the alarm time.
C D
Hours Minutes
[2]
(c) Describe how the microprocessor can determine when to sound the clock alarm.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(d) The LCD (liquid crystal display) on the clock face is back-lit using blue LEDs (light emitting
diodes). The brightness of the clock face is determined by the level of light in the room. The
amount of light given out by the LEDs is controlled by a control circuit.
Describe how the sensor, microprocessor and LEDs are used to maintain the correct
brightness of the clock face.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(e) Modern LCD monitors and televisions use LED back-lit technology.
Give two advantages of using this new technology compared to the older cold cathode
fluorescent lamp (CCFL) method.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
Question Answer
[5]
10 Five statements about interpreters and compilers are shown in the table below.
[5]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2015 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.
1 (a) parallel
serial
(b) parallel
serial
(c) parallel
serial
3 (a)
Working
A B C X
1
0 0 0
] 1 mark
0
0 0 1
0
0 1 0
] 1 mark
0
0 1 1
0
1 0 0
] 1 mark
1
1 0 1
1
1 1 0
] 1 mark
1
1 1 1
[4]
[3]
(c) X is 1 if:
(A is 1 OR B is 1) (1 mark)
AND (1 mark)
(B is 1 OR C is NOT 1) (1 mark)
e.g. (A + B) (B + C) [3]
1 protocol
3 file name
HTML tags/text
firewall
proxy server
[6]
[10]
6 (a) virus
pharming
phishing
[6]
anti-virus
– removes/warns of a potential virus threat which can’t be passed on to
customers
firewall
– (helps) to protect bank computers from virus threats and hacking
encryption
– protects customer data by making any hacked information unreadable
security protocol
– governs the secure transmission of data
Biometric
– to recognise user through the use of, e.g. facial/retina/finger print
Alerts
– users IP/MAC address is registered and user is alerted through, e.g. SMS if
account is accessed through an unregistered address
[2]
7 (a)
this bus carries signals used to
address bus coordinate the computer’s
activities
(b)
the instruction is then copied from the memory location contained in the
MAR (memory address register) and is placed in the MDR (memory data 3
register)
the PC (program counter) contains the address of the next instruction to be (1)
fetched
the entire instruction is then copied from the MDR (memory data register)
4
and placed in the CIR (current instruction register)
the address part of the instruction is placed in the MAR (memory address
6
register)
The incrementation of the program counter can appear at any stage after 2. All other
stages must be in the correct given order. [6]
8 (a) hours: 18
minutes: 53 [2]
(b)
0 0 0 0 0 1 1 1 : 0 0 0 1 1 1 1 0
[2]
– and checks the values against those stored in registers “A” and “B”
(NOTE: the first two statements can be interchanged, i.e. “A” and “B” read first)
– no need to warm up
– higher resolution
x
If 1 GByte = 2
value of X?
then what is the
12
[5]
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
Calculators must not be used in this paper.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The maximum number of marks is 75.
1 A company selling CDs uses a unique 6-digit identification number for each CD title. The right-
most digit (position 1) is a check digit.
For example,
6 5 4 3 2 1 digit position
3 0 6 1 4 9 identification number
check digit
(a) Show whether the following identification numbers are valid or not. You must show how you
arrived at your answer.
Identification number 1: 4 2 1 9 2 3
working:
Identification number 2: 8 2 0 1 5 6
working:
5 0 2 4 1 __
working:
(c) Describe, with examples, two different types of data entry errors that a check digit would
detect.
[2]
2 Kamil is setting up a new computer system to record television programmes. He wants to be able
to record, view and then erase programmes that he does not want to keep. He has chosen to use
DVD-RAM as an optical storage medium.
Explain to Kamil why it is better to use DVD-RAM rather than DVD+RW or DVD-RW.
[2]
3 An alarm, Y, sends a signal (Y = 1) when certain fault conditions in a chemical process are
detected. The inputs are:
1 acidity > 5
A
0 acidity <= 5
1 stirrer bar ON
S
0 stirrer bar OFF
(a) Draw the logic circuit for the above system using these logic gates.
NOT AND OR
T Y
[5]
A T S Y
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
4 A digital alarm clock is controlled by a microprocessor. It uses the 24-hour clock system (i.e. 6 pm
is 18:00).
For example:
0 0 0 0 1st digit (0)
(a) What time is shown on the clock display if the 4-digit binary codes are:
0 0 0 1
0 1 1 0
0 1 0 0
(clock display)
1 0 0 1
[2]
(b) What would be stored in the 4-digit binary codes if the clock display time was:
1st digit
2nd digit
3rd digit
4th digit
[4]
Describe the actions of the microprocessor which enable the alarm to sound at 08:00.
[2]
5 Bytes of data transferred using a serial cable are checked for errors at the receiving end using an
even parity check.
(a) 01010101
[1]
(b) 11001000
[1]
[2]
6 The conditions in a fish tank are being controlled using sensors and a microprocessor. To keep
the fish healthy, the temperature must be at 25°C and the oxygen content needs to be 20 ppm
(parts per million). The tank contains a heater and an oxygen inlet controlled by a valve.
sensor A sensor B
microprocessor
Sensor A
Sensor B [2]
(b) Describe how the sensors and the microprocessor are used to maintain the correct
conditions in the fish tank.
[4]
(c) What safeguards are needed to stop the fish tank temperature rising too high?
[1]
7 Ahmed uses the Internet for some time and is puzzled by the terminology.
(a) Draw a line to match each description to the appropriate technical term.
[5]
(b) Ahmed sees the message “Set your browser to accept cookies”.
[2]
[1]
[1]
(b) Flash memories and CD-RWs are used as backing media for computers.
[2]
(a) State the name for the area of memory used to store temporarily the data being sent to the
printer.
[1]
(b) The printer runs out of paper during the printing job. A signal is sent back to the computer to
stop temporarily its current task.
[1]
10 In a simple symmetric encryption system, each letter of the alphabet is substituted with another.
Agbbm Pmubq
[2]
Computer Science
[2]
(b) Both the person who sends the message and the person who receives it need to know
what the substitution key is, and they need to keep this secret. A copy of the
substitution key has been sent using SSL transmission.
[1]
(ii) How does SSL keep the copy of the key secret during transmission?
[1]
11 Five security or data loss issues are shown on the left-hand side.
Five possible methods of data recovery or protection are shown on the right.
Draw a line to match each definition/description of Issues to the most appropriate Methods of
Data Recovery.
[4]
[1]
[1]
[1]
[2]
13 When a key is pressed on the keyboard, the computer stores the ASCII representation of the
character typed into main memory.
Location 1 A
Location 2 C
(a) (i) Show the contents of Location 1 and Location 2 as binary using 8 bits.
Location 1
Location 2
[2]
Location 1
Location 2 [2]
(b) The following machine code instruction is stored in a location of main memory:
1 1 1 1 1 0 1 0 1 0 0 1 0 1 1 1
[4]
(c) Explain why a programmer would prefer to see the contents of the locations displayed as
hexadecimal rather than binary, when debugging his program that reads the key presses.
[2]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
MAXIMUM MARK: 75
working
= (5 × 6) + (0 × 5) + (2 × 4) + (4 × 3) + (1 × 2)
= 30 + 0 + 8 + 12 + 2
= 52
need to add 3 to make the total 55 (i.e. exactly divisible by 11)
2 digits transposed
(e.g. 280419 becomes 280149/two digits have been switched)
incorrect digit
(e.g. 280419 becomes 250419/one of the digits has been mistyped) [2]
A
AND
NOT
OR Y
T
AND
S NOT
[5]
(b)
A T S Y
]
0 0 0 0
1 mark
0 0 1 0
]
0 1 0 1
}
1 mark
0 1 1 0
]
1 0 0 1
1 mark
1 0 1 1
1
1
1
1
0
1
1
0
] 1 mark
[4]
1 6 : 4 9
1 mark 1 mark [2]
0 0 0 1 1st digit
0 1 1 1 2nd digit
0 0 1 0 3rd digit
1 0 0 1 4th digit [4]
(b) No [1]
7 (a)
(ii) 30 [1]
Flash memory
– solid state memory
– no formatting issues
– plugs directly into the USB port
– direct transfer of data
CD-RW
– optical media
– slower access speed/flash memory has faster access speed
– requires a separate drive
– data needs to be burnt/finalised/finished (before being used on another device) [2]
11
(d) – compiler produces object code / interpreter doesn’t produce object code
– compiler translates whole program in one go / interpreter translates and executes line at
a time
– compiler produces list of all errors / interpreter produces error message each time an
error encountered
– compiler produces “stand alone code” / interpreter doesn’t produce “stand alone code”
– compilation process is slow but resultant code runs very quickly / interpreted code runs
slowly [2]
13 (a) (i)
Location 1 0 1 0 0 0 0 0 1
Location 2 0 1 0 0 0 0 1 1
[2]
(ii) 41
43 [2]