Uploaded by bso

14-to-oct-to-nov18-pastpapers-computer-science-igcse

advertisement
.
1
2014-2018
Past Papers & Mark Schemes
COMPILED BY: M.Mushtaq
03215275281
Hussain
.
2
Cambridge International Examinations
Cambridge Ordinary Level
*3178912092*
COMPUTER STUDIES
7010/12
May/June 2014
Paper 1
2 hours 30 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
Answer all questions.
No marks will be awarded for using brand names of software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The maximum number of marks is 100.
This document consists of 24 printed pages.
IB14 06_7010_12/FP
© UCLES 2014
[Turn over
.
36
5
The following algorithm should:
•
•
•
input ten numbers
output the largest number input
output the average value of the input data
10
largest = 0
20
sum = 0
30
for x = 1 to 10
40
input x
50
if x > largest then x = largest
60
output largest
70
sum = sum + x
80
next x
90
average = sum * 10
100
output average
There are four errors in this algorithm.
Locate these errors and suggest a correction.
error 1
correction
error 2
correction
error 3
correction
error 4
correction
[4]
© UCLES 2014
7010/12/M/J/14
.
47
6
The following diagram shows six descriptions of automatic data capture methods and six terms.
Draw lines to connect each description to the correct term.
reading data directly from hard
copy and converting into electronic/
computer-readable form
biometrics
use of fingerprint scans, retina
scans, face identification, etc. as a
way of identifying a person
uniquely
data logging
recognises spoken word patterns
and compares them to patterns
stored in memory
optical
character
recognition
(OCR)
use of minute electronic devices
(containing microchip and antenna)
that can be read from distances up
to 5 metres
optical mark
recognition
(OMR)
automatic data collection using
sensors
radio
frequency
identification
(RFID)
system that reads pencil or pen
marks on a piece of paper in
pre-determined positions
voice
recognition
[5]
© UCLES 2014
7010/12/M/J/14
[Turn over
.
10
5
8
In each case below, state which Internet term is being described.
(a) Malicious software installed on a user’s hard drive or a web server; the software re-directs
the user to a fake website without their consent or knowledge.
[1]
(b) Personal Internet journals where a writer enters text about a certain topic; anyone can
comment on the topic.
[1]
(c) Websites designed to promote the building of online communities who share the same
interests; usually free of charge; users can add friends, post messages to each other and
update personal profiles.
[1]
(d) Legitimate-looking email sent to a user in the hope of gathering personal information; as
soon as the recipient clicks on the link in the email (or email attachment) they are sent to a
fake website.
[1]
(e) Software that secretly gathers information by monitoring key presses on a user’s keyboard;
this information is relayed back to the person who sent the software originally.
[1]
© UCLES 2014
7010/12/M/J/14
.
12
6
10 Study the following flowchart.
START
count = 1
negcount = 0
poscount = 0
neg = 0
pos = 0
zero = 0
INPUT X
Yes
is X < 0 ?
neg = neg + X
negcount =
negcount + 1
pos = pos + X
poscount =
poscount + 1
No
Yes
is X > 0 ?
No
zero = zero + 1
count = count + 1
Yes
is count <=
10 ?
No
negavge = neg/negcount
posavge = pos/poscount
OUTPUT
negavge,
posavge, zero
© UCLES 2014
STOP
7010/12/M/J/14
.
13
7
Complete the trace table for the flowchart using the following data:
0, 3, 5, 6, -4, -1, 0, 0, -4, 10
negcount poscount
neg
pos
zero
count
X
negavge
posavge
[6]
© UCLES 2014
7010/12/M/J/14
[Turn over
.
16
8
13 An algorithm has been written to check that code numbers are valid on input. They must be in the
range 1000 to 9999.
Five hundred codes are being entered and the percentage of entered codes which are incorrect
is output.
There is a flowchart on the opposite page. It has some statements missing.
Complete the flowchart. Use statement numbers only, chosen from the list below.
© UCLES 2014
statement number
statement
1
Incorrect = Incorrect + 1
2
INPUT Code
3
is Number <= 500 ?
4
is Code < 1000 ?
5
is Code > 9999 ?
6
Number = 1
7
Number = Number + 1
8
OUTPUT Percent
9
Percent = Incorrect / 5
7010/12/M/J/14
.
17
9
START
incorrect = 0
Yes
No
Yes
No
Yes
No
STOP
[4]
© UCLES 2014
7010/12/M/J/14
[Turn over
.
1200
16 An encryption system gives each letter of the alphabet a value:
A = 1, B = 2, C = 3, ……… , Y = 25, Z = 26.
Each letter is stored in a 12-bit binary register. The letter “S” (19th letter) is stored as:
2048 1024 512
0
0
0
256
128
64
32
16
8
4
2
1
0
0
0
0
1
0
0
1
1
A 4-bit register is used to store the encryption key. This register shows how many places the bits
are shifted to the left in the 12-bit register when it is encrypted. So,
8
4
2
1
0
1
0
1
means each bit in the 12-bit register is shifted 5 places to the left and the register now becomes:
2048 1024 512
0
0
1
256
128
64
32
16
8
4
2
1
0
0
1
1
0
0
0
0
0
Therefore, the letter “S” would be transmitted with the 4-bit register and the 12-bit register as
follows:
0
1
0
1
0
0
1
0
0
1
1
0
0
0
0
0
(a) “W” is the 23rd letter of the alphabet.
(i) Show how this letter would be stored in the 12-bit register before encryption:
(ii) The 4-bit register contains the following value:
8
4
2
1
0
1
1
0
Show how the letter “W” is now stored in the 12-bit register in encrypted form:
[2]
© UCLES 2014
7010/12/M/J/14
.
1211
(b) Find which letter of the alphabet has been encrypted here. (Show all your working.)
0
0
1
1
0
0
0
0
1
1
0
0
1
0
0
0
[2]
(c) (i) What is the largest encryption key that can be stored in the 4-bit register?
8
4
2
1
(ii) Convert this into denary (base 10).
(iii) If this encryption key were used, what problem would it cause?
[3]
© UCLES 2014
7010/12/M/J/14
[Turn over
.
1222
17 (a) Complete the truth table for the following logic circuit:
A
X
B
C
Working
A
B
C
0
0
0
0
0
1
0
1
0
0
1
1
1
0
0
1
0
1
1
1
0
1
1
1
X
[4]
© UCLES 2014
7010/12/M/J/14
.
1233
(b) Write the logic statement to describe the following logic circuit:
A
X
B
C
[3]
© UCLES 2014
7010/12/M/J/14
[Turn over
Page 3
3
.
Mark Scheme
14
GCE O LEVEL – May/June 2014
Syllabus
7010
Paper
12
(a) 1 mark for naming software + 1 mark for a matching purpose
software:
purpose:
codec
– converts (and compresses) analogue data into digital data
software:
purpose:
(vide/audio) compression software
– reduces amount of (video/audio) data being transmitted
software
purpose:
echo cancellation software
– allows talking in real time
– prevents feedback/sound from speakers being picked up by microphone [4]
(b)
statement
advantage
it is possible to hold meetings at any time
there is no problem with time zones
reduces the “hidden cost” of employees being away from the office
[1]
(c) 1 mark for reason why each statement is incorrect:
– microphone only pick up sound/input device
– loudspeakers needed to produce the sound/voices for delegates to hear
– webcams do not record any data/video
– webcams (only) capture data/video
– webcams do not transmit data/video
[2]
(d) Any two from:
– expensive to set up
– poor quality of sound/video or need fast internet connection
– time zones can cause problems/differences in time zones
© Cambridge International Examinations 2014
[2]
4
.
Mark Scheme
15
GCE O LEVEL – May/June 2014
Page 4
(a) Any one from:
Syllabus
7010
– search engine can pick up unrelated websites
– can result in too many “hits”
Paper
12
[1]
(b) Any one from:
– narrow down the search criteria
– e.g. chemistry transition element
– use of “…” around key words
(c) – pornographic/objectionable websites can be found
– unreliable/unnecessary information
– unwanted advertisements/pop-ups
[1]
[1]
(d) Any one from:
– faster/easier to do a search rather than looking at, e.g., several book indexes
– information more up-to-date
– can cut and paste information directly into a document
5
[1]
1 mark for identification of error and suggested correction (description or corrected pseudocode)
error:
correction:
number
line 40: input x; using same input value as loop variable will cause problems or line
30: for x = 1 to 10
change loop variable e.g. for count = 1 to 10 or change input variable e.g. input
error:
correction:
line 50: formula is reversed
…. then largest = x (or largest = number)
error:
correction:
line 60: output shouldn’t be inside the loop
100 output average, largest
error:
correction:
line 90: incorrect formula
average = sum/10
© Cambridge International Examinations 2014
[4]
Page 5
6
.
Mark Scheme
16
GCE O LEVEL – May/June 2014
Syllabus
7010
Paper
12
1 mark for each correct link up to maximum of 5 marks
reading data directly from hard copy
and converting into electronic/
computer-readable form
biometrics
use of fingerprint scans, retina scans,
face identification, etc. as a way of
identifying a person uniquely
data logging
recognises spoken word patterns and
compares them to patterns stored in
memory
optical character
recognition (OCR)
use of minute electronic devices
(containing microchip and antenna)
that can be read from distances up to
5 metres
optical mark recognition
(OMR)
automatic data collection using
sensors
radio frequency
identification (RFID)
system that reads pencil or pen marks
on a piece of paper in pre-determined
positions
voice recognition
[5]
© Cambridge International Examinations 2014
9
.
Mark Scheme
17
GCE O LEVEL – May/June 2014
Page 7
1 mark per point
Syllabus
7010
Paper
12
(i) key frames
(ii) tweening
(iii) morphing
(iv) rendering
(v) avars
[5]
10 (NOTES: Additional 0s in any column (UNLESS THEY ARE JUST THE REPEAT OF 0 VALUES)
lose the mark for that column
If columns 1 to 7 are wrong there can be one mark for initialisation (0 0 0 0 0 1) and a mark for
the correct output -3, 6).
negcount
poscount
neg
pos
zero
count
X
0
0
0
0
0
1
1
2
0
1
3
3
3
2
8
4
5
3
14
5
6
1
–4
6
–4
2
-5
7
–1
2
8
0
3
9
0
10
–4
11
10
3
–9
4
24
< - - - - - - 1 mark - - - - - > 1 mark
1 mark
negavge
posavge
–3
6
1 mark <- - - -1 mark - - - -> < - - - - - 1 mark - - - - >
[6]
© Cambridge International Examinations 2014
Page 10
13
.
Mark Scheme
18
GCE O LEVEL – May/June 2014
Syllabus
7010
Paper
12
[4]
© Cambridge International Examinations 2014
.
Mark Scheme
19
GCE O LEVEL – May/June 2014
Page 11
Syllabus
7010
Paper
12
14 1 mark for each working formula in cells C3, C4, and C5.
A
B
C
1
input mass number
56
2
input atomic number
26
3
number of electrons =
= B2
4
number of protons =
= B2 (or = C3)
5
number of neutrons =
= B1 – B2
[3]
15 (a) 1 mark for each item:
–
–
–
–
–
–
knowledge base
rule(s) base
inference engine
(expert system) shell
explanation system
user interface/HCI
[4]
(b) Any one from:
–
–
–
–
–
–
–
chess/strategy games
prospecting for oil/minerals
medical diagnosis
engine diagnostics
television/computer/electronic diagnostics
financial/tax advice
career advice
[1]
16 (a) (i) 1 mark for correct binary numbers
0
0
0
0
0
0
0
1
0
1
1
1
1
0
0
0
0
0
0
(ii) 1 mark for correct binary numbers
0
1
0
1
1
[2]
© Cambridge International Examinations 2014
.
Mark Scheme
20
GCE O LEVEL – May/June 2014
Page 12
(b) one mark
– letter “Y” or 25th letter
Syllabus
7010
One mark
– the binary number 0 0 0 0 1 1 0 0 1 0 0 0 has been shifted (to the left) 3 places
– so the binary number becomes 0 0 0 0 0 0 0 1 1 0 0 1
– 1+8+16
Paper
12
[2]
(c) (i) 1 1 1 1
(ii) 15 (allow follow through from (i))
(iii) – try to move 15 places to the left which is not possible
– only 12 bits in register to store letter; 15 is too large
– you would end up with 12 0s in the register
[3]
17 (a)
A
B
C
X
0
0
0
1
0
0
1
1
0
1
0
0
0
1
1
1
1
0
0
1
1
0
1
1
1
1
0
0
1
1
1
0
1 mark
1 mark
1 mark
1 mark
[4]
S
© Cambridge International Examinations 2014
.
Mark Scheme
21
GCE O LEVEL – May/June 2014
Page 13
(b) ( A = NOT 1 )
Syllabus
7010
Paper
12
1 mark
OR
1 mark
(( A = 1 OR B = 1) AND C = 1 )
1 mark
Accept:
A
+
(( A + B ). C )
or
A
+
( A + B ). C
Accept:
A’
+
(( A + B ). C )
or
A’
+
( A + B ). C
(1 mark)
(1 mark)
(1 mark)
(NOT A)
OR
(( A OR B ).AND C )
(1 mark)
(1 mark)
(1 mark)
Accept:
[3]
18 marking points:
•
•
•
•
•
•
•
•
•
initialisation of all 5 totals
loop to control input for all 1500 students
input choice and name of student inside the loop
check student choice …
… increment the appropriate total
output name of student who likes classical music
find the 5 percentages (either using /15 or (*100/1500)) outside the loop
output the 5 percentages outside the loop (must have some processing)
error checking
© Cambridge International Examinations 2014
Page 14
.
Mark Scheme
22
GCE O LEVEL – May/June 2014
sample algorithm (in pseudocode)
Syllabus
7010
Paper
12
NOTE: many students may make use of the case … of … endcase construct here rather than five IF
statements
rock = 0: soul = 0: pop = 0: jazz = 0: classical = 0
1 mark
for student = 1 to 1500
1 mark
input choice, pupil_name
if choice = 1 then rock = rock + 1
if choice = 2 then soul = soul + 1
if choice = 3 then pop = pop + 1
if choice = 4 then jazz = jazz + 1
if choice = 5 then classical = classical + 1
if choice = 5 then output pupil_name
next student
percent1 = rock/15
percent2 = soul/15
percent3 = pop/15
percent4 = jazz/15
percent5 = classical/15
output percent1, percent2, percent3, percent4, percent5
(sample pseudocode showing a possible case … of construct:
(alternative to rows 4 to 9 in above algorithm)
case of choice:
1: rock = rock + 1
2: soul = soul + 1
3: pop = pop + 1
4: jazz = jazz + 1
5: classical = classical + 1
output pupil_name
endcase)
© Cambridge International Examinations 2014
1 mark
2 marks
1 mark
1 mark
1 mark
2 marks
1 mark
[5]
.
23
Cambridge International Examinations
Cambridge Ordinary Level
* 8 8 5 0 4 1 6 5 8 5 *
7010/12
COMPUTER STUDIES
Paper 1
October/November 2014
2 hours 30 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
Answer all questions.
No marks will be awarded for using brand names of software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
This document consists of 23 printed pages and 1 blank page.
DC (LEG/CGW) 100859
© UCLES 2014
[Turn over
.
244
4
Six statements and six values are shown below.
Each statement will generate one possible value.
Draw a line to link each statement to its correct value.
statement
value
number of times the following
loop operates:
count = 1
repeat
input x
count = count + 1
until count = 5
1
the number of bits that make up
a byte
base 10 (denary) value of the
following binary number:
32
16
8
4
2
1
0
0
1
1
1
1
4
5
8
the number of tracks on the
single side of a CD-R
number of minutes to upload a
75 Mbyte file at 2 megabits/
second upload speed
10
X
If there are 2 bytes in a Kbyte,
what is the value of X?
15
[5]
© UCLES 2014
7010/12/O/N/14
.
265
6
The following section of a pseudocode algorithm should:
•
•
•
•
input 500 numbers
generate a ratio called k
output each value of k
output how many numbers were larger than 10
10
20
30
40
50
60
70
80
total = 1
FOR x = 1 TO 500
IF number < 10 THEN total = total + 1
k = x / number
x = x + 1
OUTPUT k
NEXT x
OUTPUT x
(a) There are five errors in the above code.
Locate these errors and suggest a correction.
error 1 .......................................................................................................................................
correction ..................................................................................................................................
...................................................................................................................................................
error 2 .......................................................................................................................................
correction ..................................................................................................................................
...................................................................................................................................................
error 3 .......................................................................................................................................
correction ..................................................................................................................................
...................................................................................................................................................
error 4 .......................................................................................................................................
correction ..................................................................................................................................
...................................................................................................................................................
error 5 .......................................................................................................................................
correction ..................................................................................................................................
...............................................................................................................................................[5]
© UCLES 2014
7010/12/O/N/14
.
276
(b) The corrected algorithm was converted to a computer program and run. However, after
several numbers were input, the program stopped and an error message was generated,
showing that there was a further error at line 40 (k = x / number).
State what could cause this error to occur.
...................................................................................................................................................
...................................................................................................................................................
Suggest a change to line 40 to overcome this problem.
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
© UCLES 2014
7010/12/O/N/14
[Turn over
.
287
7
A digital camera contains a microprocessor. The camera’s specification includes:
•
•
•
20 megapixel resolution
32 gigabyte memory card
autofocus facility
(a) A more expensive model of the camera has 40 megapixel resolution.
(i)
Describe one advantage of increasing the resolution.
...........................................................................................................................................
.......................................................................................................................................[1]
(ii)
Describe one disadvantage of having 40 megapixel resolution.
...........................................................................................................................................
.......................................................................................................................................[1]
(b) (i)
Describe the type of memory used in the memory card.
...........................................................................................................................................
.......................................................................................................................................[1]
(ii)
Give one benefit of using this type of memory.
...........................................................................................................................................
.......................................................................................................................................[1]
(c) (i)
What is the meaning of the term pixel?
...........................................................................................................................................
.......................................................................................................................................[1]
(ii)
If a compressed image file requires an average of 1 byte per pixel, what is the maximum
number of photos that can be stored on the memory card?
...........................................................................................................................................
.......................................................................................................................................[1]
(d) Apart from autofocus, describe one other feature you would expect to see on a digital camera
controlled by a microprocessor.
...................................................................................................................................................
...............................................................................................................................................[1]
© UCLES 2014
7010/12/O/N/14
.
298
8
The doors on a train are opened and closed automatically. Motors are used to operate the doors.
The system is controlled by a microprocessor.
Each door has a sensor which detects if a passenger enters or leaves the train as the doors are
closing. If a passenger is detected, the doors are automatically re-opened.
(a) Name a sensor which could be used to detect a passenger.
...............................................................................................................................................[1]
(b) If the sensor in one of the doors fails, describe a safety mechanism to prevent injury to a
passenger.
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[1]
(c) Describe how the sensors, microprocessor and door motors interact to ensure a passenger
is not trapped in a closing door.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
© UCLES 2014
7010/12/O/N/14
[Turn over
.
2129
10 (a) The flowchart on the next page shows how barcodes are used in a supermarket to find
product information and to produce orders for new stock automatically. Several statements
are missing from the flowchart.
Complete the flowchart, using item numbers only from the list below.
Item
number
© UCLES 2014
Description
1
is barcode found?
2
is barcode read?
3
is flag for this product = 1?
4
is number in stock <= re-order value?
5
key in the barcode manually
6
locate price and product information from file
7
output an error message
8
output order request for new stock
9
output receipt and itemised bill
10
reduce number in stock by 1 and write new value back to the record
11
search database for barcode
12
set flag for this product to 1
7010/12/O/N/14
.
3130
START
No
any more
barcodes to
scan?
Yes
scan barcode
STOP
No
Yes
No
Yes
Yes
No
No
Yes
[8]
© UCLES 2014
7010/12/O/N/14
[Turn over
.
3161
12 An advertising sign uses large LED characters controlled by a microprocessor.
Each letter is formed from a grid made up of eight rectangles numbered 1 to 8:
1
2
3
4
5
6
7
8
For example, the letter “Z” is formed as follows:
1
2
4
5
7
8
Each rectangle has six LEDs that can light up; these LEDs are labelled “a” to “f”:
a
e
d
b
f
c
The LEDs in a rectangle can be represented in a 6-bit register. For example, rectangle 3 of the
letter “Z”:
a
e
can be represented as:
f
0
e
1
d
0
c
0
b
0
a
1
Thus the letter “Z” can be represented by the 8 registers:
1
5
© UCLES 2014
2
4
7
8
1
2
3
4
5
6
7
8
f
0
0
0
0
0
0
0
0
7010/12/O/N/14
e
0
0
1
0
0
1
0
0
d
0
0
0
0
0
0
0
0
c
0
0
0
0
0
1
1
0
b
0
0
0
0
0
0
0
0
a
0
1
1
0
0
0
0
0
.
3172
(a) Show how the letter “E” can be represented by the eight 6-bit registers (four registers have
been done for you).
f
e
d
c
b
a
0
0
0
0
0
0
1
2
3
1
2
3
4
5
6
7
8
0
0
0
0
0
0
4
0
0
0
0
0
0
5
6
7
0
0
0
0
0
0
8
[4]
(b) State which letter of the alphabet is represented by the following eight 6-bit registers.
f
e
d
c
b
a
0
0
0
0
0
0
1
0
0
1
0
0
0
2
0
0
0
0
1
0
3
0
0
0
0
0
0
4
0
0
0
0
0
0
5
0
0
1
0
0
1
6
0
0
0
0
1
1
7
0
0
0
0
0
0
8
letter ……………………………………
[2]
© UCLES 2014
7010/12/O/N/14
[Turn over
.
3183
13 (a) Complete the truth table for the following logic circuit:
A
B
X
C
A
B
C
0
0
0
0
0
1
0
1
0
0
1
1
1
0
0
1
0
1
1
1
0
1
1
1
Working
X
[4]
© UCLES 2014
7010/12/O/N/14
.
3194
(b) Re-draw the logic circuit shown opposite, using NAND and NOR gates only.
[2]
(c) Write a logic statement that describes the following logic circuit:
A
B
X
C
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
© UCLES 2014
7010/12/O/N/14
[Turn over
.
3205
14 Study the following flowchart very carefully.
START
sum1 = 0
sum2 = 0
total = 0
INPUT a, b, c, d, e, f
Yes
is a = 0 and
b = 0?
STOP
No
sum1 = a*6 + b*5 + c*4
sum2 = d*3 + e*2 + f*1
total = sum1 + sum2
total = total – 11
is total = 0?
Yes
OUTPUT “data are OK”
No
No
© UCLES 2014
is total < 0?
Yes
7010/12/O/N/14
OUTPUT “error”
.
3216
Complete the trace table for this flowchart using the following data:
4, 3, 2, 0, 0, 8
5, 0, 1, 2, 3, 4
0, 0, 0, 0, 0, 0
sum1
sum2
total
a
b
c
d
e
f
OUTPUT
[5]
© UCLES 2014
7010/12/O/N/14
[Turn over
.
Mark Scheme
37
Cambridge O Level – October/November 2014
Page 3
4
Syllabus
7010
Paper
12
1 mark for each correct connection up to the maximum of 5
number of times the following loop
operates:
count = 1
repeat
input ×
count = count + 1
until count = 5
the number of bits that make up a
byte
base 10 (denary) value of the
following binary number:
32
0
16
0
8
4
1
1
2
1
1
number of minutes to upload a 75
Mbyte file at 2 megabits/second
upload speed
x
4
5
1
the number of tracks on single side
of a CD-R
If there are 2
1
8
10
bytes in a Kbyte,
15
what is the value of x?
[5]
© Cambridge International Examinations 2014
.
Mark Scheme
38
Cambridge O Level – October/November 2014
Page 4
5
(a)
Syllabus
7010
Paper
12
Sat Nav devices send signals to the global positioning
satellites
TRUE
Sat Nav accurately measures vehicle speed using satellite
position and accurate timing
TRUE
FALSE
Satellites tell the Sat Nav which direction the vehicle
should take
TRUE
FALSE
FALSE
FALSE
[3]
(b) Any two from:
–
–
–
6
software/maps not up to date/new road
loss of satellite signals
wrong data input by user (e.g. start point and end point)
[2]
(a) 1 mark for each error and suggested correction (accept description or example of corrected
pseudocode).
error:
correction:
line 10: total = 1
totals should be set to zero; total = 0
error:
correction:
line 30: … number < 10 …
check should be made if number > 10; … number > 10 …
error:
correction:
no input inside loop
input number
error:
correction:
line 50: x = x + 1
for … to loops don’t need a counter; remove line 50 altogether
error:
correction:
line 80: output x
output should be total value; output total
[5]
(b) division by zero error (or similar description of error produced when dividing by 0)
add an error trap after input of number
e.g. 40 if number = 0 then k = 0 else k = x/number
© Cambridge International Examinations 2014
[2]
7
.
Mark Scheme
39
Cambridge O Level – October/November 2014
Page 5
(a) (i) –
–
(ii) –
–
–
Syllabus
7010
higher quality photos
when “blown up” less likely for photo to “pixelate”
Paper
12
[1]
uses up more memory (on card)
takes longer to upload/download a photo
file size will be greater
[1]
(b) (i) –
–
–
(ii) –
–
–
(c) (i) –
(ii) –
solid state memory
flash drive
non-volatile
[1]
no moving parts (so more robust)
can be removed from camera and retain its contents
can erase contents and reuse memory card
[1]
(pic)ture (el)ement
[1]
819 or 1638
[1]
(d) Any one point from: e.g.
–
–
–
–
–
–
8
auto flash
anti (hand) shake facility
easy deletion of unwanted photos
ability to “manipulate” images after they have been taken/special effects
“smart” operation e.g. automatically pick out objects, faces, etc.
auto capture
[1]
(a) Any one from:
–
–
–
infra red (sensor)
pressure (sensor)
proximity (sensor)
[1]
(b) Any one from:
–
–
–
additional sensors used
door defaults to open position
sounds an alarm if a sensor fails
© Cambridge International Examinations 2014
[1]
.
Mark Scheme
40
Cambridge O Level – October/November 2014
Page 7
10 (a)
START
Syllabus
7010
Paper
12
No
any more
barcodes
to scan ?
Yes
9
scan barcode
(1 mark)
STOP
No
2
5
Yes
(1 mark)
11
(1 mark)
(1 mark)
No
1
7
Yes
6
(1 mark)
10
(1 mark)
Yes
4
(1 mark)
No
12
3
(1 mark)
No
Yes
8
[8]
© Cambridge International Examinations 2014
.
Mark Scheme
41
Cambridge O Level – October/November 2014
Page 8
Syllabus
7010
Paper
12
(b) 1 mark for each device + 1 mark for correct matching use
device:
use:
beeper/loud speaker
to indicate barcode correctly read/error in reading barcode
device:
use:
(LCD) screen/monitor
to show prices and other information about goods
device:
use:
touch screen
to show prices and other information about goods/to select items that need to be
weighed/identified
device:
use:
weighing machine
to find weight of loose items (e.g. fruit) to enable pricing
device:
use:
(magnetic) card reader/CHIP and PIN reader
to read customer’s debit/credit card/enable customer to pay for goods using a
credit or debit card
device:
use:
printer
to print receipts
(NOT keypad)
[4]
11 (a) = (B2/24) * B3
[1]
(b) = C4 * B5
[1]
(c) = IF (D1 < C6, “profit”, “no profit”) (NOTE: accept C6 > D1 in formula)
1 mark 1 mark
[2]
© Cambridge International Examinations 2014
.
Mark Scheme
42
Cambridge O Level – October/November 2014
Page 9
(d)
A
B
Syllabus
7010
C
D
1
1500
2
18
3
60
4
5
Paper
12
45
40
6
1800
1 mark
profit
1 mark
1 mark
[3]
12 (a) 1 mark for each of four rows shown in bold below; there are two possible ways of doing this –
one set of answers is shown on the left and the alternative is shown on the right in brackets.
Don’t allow mix and match; answers must either be as shown on the left OR as shown on the
right
0 0 0 0 0 0
0 0 1 0 0 1
(OR 0 0 1 1 0 1)
– 1 mark
0 0 0 0 0 1
(OR 0 0 0 1 0 1)
– 1 mark
0 0 1 1 0 1
(OR 0 0 1 1 0 0)
– 1 mark
0 0 0 1 0 1
(OR 0 0 0 1 0 0)
– 1 mark
0 0 0 0 0 0
0 0 0 0 0 0
0 0 0 0 0 0
[4]
(b) 2 marks for identifying the letter
letter: H
[2]
© Cambridge International Examinations 2014
.
Mark Scheme
43
Cambridge O Level – October/November 2014
Page 10
13 (a)
A
B
C
X
0
0
0
0
0
0
1
0
0
1
0
1
0
1
1
1
1
0
0
1
1
0
1
1
1
1
0
1
1
1
1
1
Syllabus
7010
Paper
12
1 mark
1 mark
1 mark
1 mark
[4]
(b) 1 mark per correct NOR gate and NAND gate on the left (ONLY accept two-input gates)
A
1 mark
X
B
1 mark
C
[2]
(c) 1 mark per logic statement as shown below:
(A = 1 AND B = 1) OR (B = NOT 1 AND C = 1)
(1 mark)
(1 mark)
(1 mark)
The above can be written as:
(A AND B) OR (NOT B AND C)
(1 mark) (1 mark) (1 mark)
Note: allow 1st part of formula and 2nd part of formula to be reversed:
(e.g. (NOT B AND C) OR (A AND B))
Also accept Boolean algebra:
b .c
a.b
+
(1 mark) (1 mark) (1 mark)
(can be written as: A.B + B.C)
© Cambridge International Examinations 2014
[3]
.
Mark Scheme
44
Cambridge O Level – October/November 2014
Page 11
Syllabus
7010
Paper
12
14 NOTE: sum1, sum2 and total MUST be initialised for all three inputs to get the mark; allow
repetition in any of the columns EXCEPT the OUTPUT column (e.g. sum1 can be 0, 47, 47, 47,
47, 47, 47);
sum1
sum2
total
a
b
c
d
e
f
0
0
0
4
3
2
0
0
8
47
8
55
OUTPUT
44
33
22
11
0
0
0
0
34
16
50
data are
OK
5
0
1
2
3
4
39
28
17
6
-5
error
0
0
0
0
0
0
0
0
0
1 mark
1 mark
1 mark < - - - - - - - - - - - - - - - - - 1 mark - - - - - - - - - - - - - - - >
1 mark
[5]
15 1 mark per feature applied to text in question:
taxi
cabs
– search and replace feature/retype/thesaurus
yelow
yellow
– spell checker/retype/auto-correct
changed
replaced
– search and replace feature/retype/thesaurus
translate last sentence/line
– (auto-)translator English to Spanish/other language
[4]
© Cambridge International Examinations 2014
Page 12
16 marking points:
•
•
•
•
•
•
•
•
.
Mark Scheme
45
Cambridge O Level – October/November 2014
Syllabus
7010
Paper
12
initialise highest value (zero or less)
loop control for all 3000 students
set total = 0 (to find the average) before second loop
loop control for all 8 exams
check if input mark higher than stored highest mark
if input mark higher, then set highest to this new value
find the average mark for each student (includes correct total addition)
both outputs in the correct place
(average after inside loop, highest outside outer loop)
(must be an attempt to find both average and highest to earn this mark)
sample program:
highest = -1
for student = 1 to 3000
total = 0
for exam = 1 to 8
input mark
total = total + mark
if mark > highest then highest = mark
next
average = total/8
output average
next
output highest
1 mark
1 mark
1 mark
1 mark
2 marks
1 mark
1 mark
© Cambridge International Examinations 2014
[5]
.
46
Cambridge International Examinations
Cambridge Ordinary Level
* 4 5 1 3 7 5 4 9 8 7 *
7010/13
COMPUTER STUDIES
Paper 1
October/November 2014
2 hours 30 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
Answer all questions.
No marks will be awarded for using brand names of software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
This document consists of 22 printed pages and 2 blank pages.
DC (LK/CGW) 100855
© UCLES 2014
[Turn over
.
457
5
Six statements and six values are shown below.
Each statement will generate one possible value.
Draw a line to link each statement to its correct value.
statement
value
number of possible binary input
combinations for a 2-input logic
gate circuit
0
output from the logic gate:
1
1
1
base 10 (denary) value of the
following binary number:
4
2
1
1
1
0
4
what is the output from the
algorithm:
y=1
for x = 1 to 4
y=y*x
next x
print y
6
number of bytes formed from
8 bits
20
If there are 2X bytes in a Mbyte,
what is the value of X?
24
[5]
© UCLES 2014
7010/13/O/N/14
[Turn over
.
468
6
The following pseudocode algorithm should:
• input up to 20 numbers
• stop if the sum of the input numbers exceeds 50
• output the final sum
10
20
30
40
50
60
70
80
count = 0
REPEAT
INPUT n
n + sum = sum
IF sum = 50 THEN count = 20
count = count + 1
UNTIL count = 20
OUTPUT n
There are five errors in this algorithm.
Locate these errors and suggest a correction.
error 1 .......................................................................................................................................
correction ..................................................................................................................................
...................................................................................................................................................
error 2 .......................................................................................................................................
correction ..................................................................................................................................
...................................................................................................................................................
error 3 .......................................................................................................................................
correction ..................................................................................................................................
...................................................................................................................................................
error 4 .......................................................................................................................................
correction ..................................................................................................................................
...................................................................................................................................................
error 5 .......................................................................................................................................
correction ..................................................................................................................................
...............................................................................................................................................[5]
© UCLES 2014
7010/13/O/N/14
.
489
8
Data sent across the Internet are frequently encrypted. The following flowchart shows a basic
encryption method (Note: the → symbol in the flowchart means “is replaced by”).
START
INPUT
character
is character =
“.” ?
Yes
STOP
No
is character a
vowel ?
Yes
a
e
i
o
u
A
A
A
A
A
o
u
a
e
i
b
c
d
f
g
h
j
A
A
A
A
A
A
A
s
t
v
w
x
y
z
k
l
m
n
p
q
r
A
A
A
A
A
A
A
b
c
d
f
g
h
j
s
t
v
w
x
y
z
A
A
A
A
A
A
A
k
l
m
n
p
q
r
No
is character =
b,c,d,f,g,h or j ?
Yes
No
is character =
k,l,m,n,p,q or r ?
Yes
No
No
© UCLES 2014
is character =
s,t,v,w,x,y or z ?
Yes
7010/13/O/N/14
.
590
For example,
l o
i
a m
a
r o b o t
.
y u c c e
a
o d
o
j e s e l
.
h e l
becomes:
(a) Use the flowchart to encrypt the following message:
m e e t
i n g
w i
l
l
g o
a h e a d .
[2]
(b) Use the information in the flowchart to show which input message produced the following
encrypted message:
t e d g i
l a f x
a k
w i
f
.
[2]
(c) Many customers shop online.
Apart from encryption, describe three other security features built into many online shopping
websites.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...............................................................................................................................................[3]
© UCLES 2014
7010/13/O/N/14
[Turn over
.
5101
9
A cinema (movie theatre) uses automatic machines to allow customers to select tickets for movie
shows. Payments are made by credit or debit card.
(a) Identify two input devices which could be used by the cinema.
For each device, describe what it is used for.
input device 1 ............................................................................................................................
use ............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
input device 2 ............................................................................................................................
use ............................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) Identify two output devices which could be used by the cinema.
For each device, describe what it is used for.
output device 1 ……………………………………………………………………………………
use ............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
output device 2 .........................................................................................................................
use ............................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
© UCLES 2014
7010/13/O/N/14
.
5112
10 A microwave oven cooks food when the food is placed on a rotating plate and the door is closed.
The oven is controlled by a microprocessor.
(a) Name two sensors that could be used in the microwave oven.
1 ................................................................................................................................................
2 ............................................................................................................................................[2]
(b) Describe two items of data that the user would need to input before pressing the start button.
Describe how these data could be input.
data 1
...................................................................................................................................................
...................................................................................................................................................
method of input 1
...................................................................................................................................................
...................................................................................................................................................
data 2
...................................................................................................................................................
...................................................................................................................................................
method of input 2
...................................................................................................................................................
.............................................................................................................................................. [4]
(c) Describe the role of the microprocessor in the microwave oven.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
© UCLES 2014
7010/13/O/N/14
[Turn over
.
5123
11 An algorithm has been written to input six temperatures for every day of the year (365 days). The
outputs are:
• the average daily temperature for each day
• the highest recorded temperature for the whole year
The algorithm is in the form of a flowchart on the next page. However, several of the statements
are missing.
Using instruction number only, complete the flowchart using the following list of instructions:
Instruction
number
© UCLES 2014
Instruction
1
average = total / 6
2
day = day + 1
3
high = -200
4
high = temperature
5
input temperature
6
is reading <= 6 ?
7
is temperature > high ?
8
output average
9
output high
10
reading = reading + 1
11
total = 0
12
total = total + temperature
7010/13/O/N/14
.
5134
START
day = 1
reading = 1
Yes
No
Yes
No
STOP
Yes
is day <=
365 ?
No
[6]
© UCLES 2014
7010/13/O/N/14
[Turn over
.
5165
13 Study the following flowchart very carefully.
START
T1 = 0
T2 = 0
T3 = 0
INPUT A, B, C
is A = 0
and B = 0 and
C=0?
Yes
OUTPUT T1,
T2, T3
STOP
No
is A > B ?
Yes
No
is B > C ?
is A > C ?
No
No
T3 = T3 + 1
Yes
T2 = T2 + 1
© UCLES 2014
7010/13/O/N/14
Yes
T1 = T1 + 1
.
5176
(a) Complete the trace table for the flowchart using the following data:
3, 2, 1
T1
4, 8, 7
T2
6, 0, 3
T3
5, 6, 9
A
4, 11, 3
B
C
0, 0, 0
OUTPUT
[5]
(b) This flowchart does not give correct answers for certain sets of test data.
Suggest a data set that would give an incorrect answer.
Give a reason for your choice.
data set .....................................................................................................................................
...................................................................................................................................................
reason .......................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
© UCLES 2014
7010/13/O/N/14
[Turn over
.
5187
14 Digits on an electronic display board can be represented on a 7 × 5 grid. For example, the digit 3 is
represented as:
1 2 3 4 5
Row 1
Row 2
Row 3
Row 4
Row 5
Row 6
Row 7
Each column in the grid is represented in a computer as a 7-bit register. Five registers are required
to represent the state of the whole digit. The value 1 represents a shaded square and the value 0
represents an unshaded square. For example, the digit 3 is represented as:
Row number: 1 2 3 4 5 6 7
Register 1
Register 2
Register 3
Register 4
Register 5
0
1
1
1
0
1
0
0
0
1
0
0
0
0
1
0
0
1
1
0
0
0
0
0
1
1
0
0
0
1
0
1
1
1
0
(a) Show the contents of the five 7-bit registers when representing the digit 9:
1 2 3 4 5
1
2
3
4
5
6
7
Row number:
1
2
3
4
5
6
7
Reg 1
Reg 2
Reg 3
Reg 4
Reg 5
[4]
© UCLES 2014
7010/13/O/N/14
.
5198
(b) In order to prevent errors, an 8-bit register is used. The 8th bit will contain:
• 0 – if the first 7 bits add up to an even number
• 1 – if the first 7 bits add up to an odd number
Complete the 8th bit for each register. The first register has been completed for you.
1
2
3
4
5
6
7
8
Reg 1
0
1
0
0
0
1
0
0
Reg 2
1
0
0
0
0
0
1
Reg 3
1
0
0
1
0
0
1
Reg 4
1
0
0
1
0
0
1
Reg 5
0
1
1
0
1
1
0
[3]
© UCLES 2014
7010/13/O/N/14
[Turn over
.
5209
15 (a) Complete the truth table for the following logic circuit:
A
B
X
C
A
B
C
0
0
0
0
0
1
0
1
0
0
1
1
1
0
0
1
0
1
1
1
0
1
1
1
Working
X
[4]
© UCLES 2014
7010/13/O/N/14
.
6210
(b) Re-draw the logic circuit shown opposite, using NAND and NOR gates only.
[2]
(c) Write a logic statement that describes the following logic circuit:
A
B
X
C
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
© UCLES 2014
7010/13/O/N/14
[Turn over
.
Mar
M k Sch
S hem
me
6e1
Cam
mbrridge
e O Le
eve
el – Oct
O tob
berr/N
Nov
vem
mb
ber 20
014
4
Pag
P ge 4
5
num
n
mbe
er of
o poss
p sible b
binary
y inputt
c mbin
com
nattion
ns for
f a2
2-inputt lo
ogic
c
g e ciircu
gate
uit
Sylllab
bus
7 10
701
Pape
er
13
0
o put fro
outp
om the
e lo
ogicc ga
ate:
1
1
1
base 10 (de
b
( nary) va
alue
e off the
fo
ollo
owing bin
nary
y num
n mbe
er:
4
2
1
1
1
0
4
wha
w
at iss th
he out
o tputt fro
om
m the
a orith
algo
hm
m:
y=1
fo
or x = 1 to
t 4
y=y*x
ne
extt x
p nt y
prin
6
n mbe
num
er of
o byte
b es form
f med frrom
m 8 bitts
20
0
Iff there
e arre 2
x
by
yte
es in
n a Mbytte,
24
4
w at iss th
wha
he valu
v ue of x?
1 mar
m rk fforr ea
ach
h co
orrrec
ct line (m
max
x 5)
5
[5
5]
© Ca
amb
brid
dge
e In
nterrnattion
nal Ex
xam
mina
atio
ons
s 20
014
4
.
Mark Scheme
62
Cambridge O Level – October/November 2014
Page 5
6
Syllabus
7010
Paper
13
1 mark for each error located with corresponding correction (description or corrected pseudocode
acceptable)
error:
correction:
line 10: sum not initialised
sum = 0
error:
correction:
line 40: incorrect formula for sum
sum = sum + n
error:
correction:
line 50: incorrect IF statement
IF sum > 50 THEN ……
error:
correction:
lines 50 and 60: value of count causes a problem e.g. loop never ending
either count = 19 on line 50
or
count = count + 1 between lines 30 and 40
or
any other correct solution
error:
correction
line 80: output of n is incorrect
output sum or print sum
[5]
7
(a) wikis
[1]
(b) social networking sites
[1]
(c) podcasts
[1]
(d) tagging
[1]
(e) blogs
[1]
8
(a)
duul a f x
na c c
< - - - - - - - - - - - - - - 1 mark - - - - - - - - - - - - - ->
x e
oy uov .
<- - - - - - - - - - 1 mark - - - - - - - - ->
[2]
(b)
c o m p u t i n g
<- - - - - - - - - - - - - 1 mark - - - - - - - - - - - - ->
i s
f u n .
<- - - - - - - - - 1 mark - - - - - - - - ->
[2]
© Cambridge International Examinations 2014
.
Mark Scheme
63
Cambridge O Level – October/November 2014
Page 6
(c) Any three from:
–
–
–
–
–
–
–
–
–
–
–
Syllabus
7010
Paper
13
customers need a password / PIN
use of card readers / use of Transaction Authentication Number (TAN)
only certain characters from password / PIN requested…
…the requested characters change each time user logs on
card security code requested
use of drop down boxes
use of a customer reference number
inform customer when they last logged on to the website
use of image verification code e.g. CAPTCHA
make reference to something unique to the customer e.g. their mobile phone number
use of secure protocol e.g. https, padlock symbol
[3]
9
(a) 1 mark for input device + 1 mark for its matching use
input device:
use:
touch screen
select film / cinema seats / price
input device:
use:
keyboard / keypad
input number of tickets / card PIN
input device:
use:
magnetic stripe reader / chip and PIN reader / card reader
reading credit / debit card details
input device:
use:
scanner
to read any promotional vouchers (etc.)
[4]
(b) 1 mark for each different output device + 1 mark for its matching use
output device: screen / monitor
use:
show films available / seating plan / prices of each seat / payment details
output device: printer
use:
print receipt / tickets
output device: loudspeaker / beeper
use:
to indicate error in input / confirmation of keys pressed
[4]
10 (a) 1 mark for each different sensor (max 2)
– pressure sensor
– example of sensor to detect if door closed / open e.g. magnetic field sensor, proximity
sensor
– moisture / humidity sensor
– temperature / infrared sensor
[2]
© Cambridge International Examinations 2014
.
Mark Scheme
64
Cambridge O Level – October/November 2014
Page 7
(b) 1 mark for each item of data (max 2):
–
–
–
–
–
–
–
Syllabus
7010
Paper
13
is the food frozen / uncooked / cooked?
cooking time
start / end time
power
weight
type of food
additional cooking feature e.g. browning
1 mark for each corresponding input method (max 2):
– turn dial to select option
– touch screen / buttons / concept keyboard / keypad to select options
– use of barcode readers (to read barcodes on food packaging which stores an automatic
cooking programme)
[4]
(c) Any four from:
– (microprocessor) checks / receives readings / data / signals from sensors….
– …..continuously
– if door open, (microprocessor) sends signal to sound alarm / stop process
– (microprocessor) compares weight of food against stored values…
– …and automatically sets cooking time / power
– cooking time controlled by (microprocessor) comparing with stored values
– (microprocessor) sends signal to beeper / notify when cooking program complete
[4]
© Cambridge International Examinations 2014
Page 8
.
Mark Scheme
65
Cambridge O Level – October/November 2014
11
Syllabus
7010
Paper
13
START
3
day = 1
11
(1 mark)
reading = 1
5
(1 mark)
Yes
4
7
No
10/12
(1 mark)
12/10
Yes
6
1
No
(1 mark)
1
8
(1 mark)
2
Yes
STOP
No
is days
<= 365 ?
9
(1 mark)
[6]
1
© Cambridge International Examinations 2014
.
Mark Scheme
66
Cambridge O Level – October/November 2014
Page 9
12 (a) (i) B3 / B2
Syllabus
7010
Paper
13
(1 mark)
(ii) (B5 / C4) * 2 or = ((B5 * B2) / B3) * 2
(1 mark)
[2]
(b) = IF(C6>D1, “above”, “equal or below”)
1 mark 1 mark
OR
= IF(D1<C6, “above”, “equal or below”)
1 mark 1 mark
Alternative word(s) for “above” are acceptable.
[2]
(c) C4, C6, D6
[1]
© Cambridge International Examinations 2014
.
Mark Scheme
67
Cambridge O Level – October/November 2014
Page 10
13 (a)
T1
T2
T3
0
0
0
Syllabus
7010
A
B
C
3
2
1
4
8
7
6
0
3
5
6
9
4
11
3
0
0
0
Paper
13
OUTPUT
1
1
2
1
2
2, 2, 1
1 mark
1 mark
1 mark
< - - - - - - - - - - 1 mark - - - - - - - - - - - ->
1 mark
If no marks are awarded for the columns then 1 mark can be given for correct initialisation of
T1, T2 & T3 as shown in the first row above.
[5]
(b) – any data set (except 0, 0, 0) where 2/3 of the numbers are the same e.g. 2, 8, 8
– flowchart does not allow for numbers which have the same value
[2]
© Cambridge International Examinations 2014
.
Mark Scheme
68
Cambridge O Level – October/November 2014
Page 11
14 (a) Row number:
1
2
3
Reg 1:
0
1
Reg 2:
1
Reg 3:
Syllabus
7010
4
5
6
7
1
0
0
0
0
0
0
1
0
0
1
1
0
0
1
0
1
0
Reg 4:
1
0
0
1
1
0
0
Reg 5:
0
1
1
0
0
0
0
Paper
13
Reg 1 + Reg 5 = 1 mark
Reg 2 = 1 mark
Reg 3 = 1 mark
Reg 4 = 1 mark
[4]
(b)
8
Reg 1:
0
Reg 2:
0
Reg 3:
1
Reg 4:
1
Reg 5:
0
Reg 2 + Reg 5 = 1 mark
Reg 3 = 1 mark
Reg 4 = 1 mark
[3]
© Cambridge International Examinations 2014
.
Mar
M k Sch
S hem
me
6e9
Cam
mbrridge
e O Le
eve
el – Oct
O tob
berr/N
Nov
vem
mb
ber 20
014
4
Pag
ge 12
1
15
5 (a)
(
A
B
C
X
0
0
0
0
0
0
1
0
0
1
0
0
0
1
1
1
1
0
0
0
1
0
1
0
1
1
0
0
1
1
1
1
Sylllab
S
bus
7 10
701
Pape
P
er
13
1m
mark
1m
mark
[4
4]
1m
mark
1m
mark
[4
4]
( ) 1m
(b)
marrk for
f corre
ect NO
OR
R ga
ate
e an
nd 1 ma
ark for corr
c rec
ct N
NAN
ND
D gate
e in
n co
orrrect positio
ons
s on
n le
eft
h nd sid
han
s de of
o dia
d agra
am
m.
A
X
B
C
[2
2]
[ A = NO
(
(c)
NOT 1 OR
R B = NOT
N T1]
A D
AN
[ B = 1 AN
AND C = NO
OT 1 ]
1 mar
m rk
1 mar
m rk
1 mar
m rk
O her no
Oth
otations wh
hic
ch are
a e accce
epttab
ble:
(NO
OT A OR
R NO
N T B)
B AN
AND (B
B AND
D NOT
N TC
C)
_ _
_
(A
A + B)
B . (B
B . C)
C
(A
A' + B')
B . (B . C')
[3
3]
© Ca
amb
brid
dge
e In
nterrnattion
nal Ex
xam
mina
atio
ons
s 20
014
4
Page 13
.
Mark Scheme
70
Cambridge O Level – October/November 2014
16 Marking points:
•
•
•
•
•
•
•
•
Syllabus
7010
Paper
13
initialise largest and two totals
control loop for 1000 items
check if price 1 > price 2 and increment total 1 (inside loop)
check if price 2 > price 1 and increment total 2 (inside loop)
calculate price difference (inside loop)
method of dealing with negative difference
check if calculated difference > largest difference and action taken if it is
three outputs OUTSIDE a loop (calculation must have been attempted)
Sample program in pseudocode:
largest = 0
smarket1 = 0: smarket2 = 0
for item = 1 to 1000
input price1, price2
if price1 > price2 then smarket1 = smarket1 + 1
if price2 > price1 then smarket2 = smarket2 + 1
difference = price1 – price2
if difference < 0 then difference = - difference
if difference > largest then largest = difference
next item
output smarket1, smarket2, largest
1 mark
1 mark
1 mark
1 mark
1 mark
1 mark
1 mark
1 mark
(max 6)
[6]
© Cambridge International Examinations 2014
.
71
Cambridge International Examinations
Cambridge Ordinary Level
COMPUTER SCIENCE
2210/01
For Examination from 2015
Paper 1 Theory
SPECIMEN PAPER
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
Calculators must not be used in this paper.
Answer all questions.
No marks will be awarded for using brand names of software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
This document consists of 14 printed pages.
© UCLES 2012
[Turn over
.
722
1
A company selling CDs uses a unique 6-digit identification number for each CD title. The rightmost digit (position 1) is a check digit.
For example,
digit position
identification number
6 5 4 3 2 1
3 0 6 1 4 9
check digit
The validity of the number and check digit is calculated as follows:
•
•
•
•
multiply each digit by its digit position
add up the results of the multiplications
divide the answer by 11
if the remainder is 0, the identification number and check digit are valid.
(a) Show whether the following identification numbers are valid or not. You must show how you
arrived at your answer.
Identification number 1: 4 2 1 9 2 3
working:
valid or not valid?
Identification number 2: 8 2 0 1 5 6
working:
valid or not valid?
© UCLES 2012
[3]
2210/01/SP/15
.
733
(b) Find the check digit for this identification number.
5 0 2 4 1 __
working:
check digit:
[2]
(c) Describe, with examples, two different types of data entry errors that a check digit would
detect.
1
2
[2]
2
Kamil is setting up a new computer system to record television programmes. He wants to be able
to record, view and then erase programmes that he does not want to keep. He has chosen to use
DVD-RAM as an optical storage medium.
Explain to Kamil why it is better to use DVD-RAM rather than DVD+RW or DVD-RW.
1
2
[2]
© UCLES 2012
2210/01/SP/15
[Turn over
.
744
3
An alarm, Y, sends a signal (Y = 1) when certain fault conditions in a chemical process are
detected. The inputs are:
Input
Binary value
Condition
1
acidity > 5
0
acidity <= 5
1
temperature >= 120UC
0
temperature < 120UC
1
stirrer bar ON
0
stirrer bar OFF
A
T
S
The alarm, Y, returns a value of 1 if:
either
temperature >= 120UC AND stirrer bar is OFF
or
acidity > 5 AND temperature < 120UC
(a) Draw the logic circuit for the above system using these logic gates.
NOT
AND
OR
A
Y
T
S
[5]
© UCLES 2012
2210/01/SP/15
.
755
(b) Complete the truth table for this alarm system.
A
T
S
0
0
0
0
0
1
0
1
0
0
1
1
1
0
0
1
0
1
1
1
0
1
1
1
Y
[4]
© UCLES 2012
2210/01/SP/15
[Turn over
.
766
4
A digital alarm clock is controlled by a microprocessor. It uses the 24-hour clock system (i.e. 6 pm
is 18:00).
Each digit in a typical display is represented by a 4-digit binary code.
For example:
0
0
0
0
1st digit (0)
1
0
0
0
2nd digit (8)
0
0
1
1
3rd digit (3)
0
1
0
1
4th digit (5)
is represented by:
(clock display)
(a) What time is shown on the clock display if the 4-digit binary codes are:
0
0
0
1
0
1
1
0
0
1
0
0
1
0
0
1
(clock display)
[2]
(b) What would be stored in the 4-digit binary codes if the clock display time was:
1st digit
2nd digit
3rd digit
4th digit
[4]
© UCLES 2012
2210/01/SP/15
.
777
(c) The clock alarm has been set at 08:00.
Describe the actions of the microprocessor which enable the alarm to sound at 08:00.
[2]
5
Bytes of data transferred using a serial cable are checked for errors at the receiving end using an
even parity check.
Can these bytes of data pass the even parity check?
(a) 01010101
[1]
(b) 11001000
[1]
(c) How can any errors be corrected?
[2]
© UCLES 2012
2210/01/SP/15
[Turn over
.
788
6
The conditions in a fish tank are being controlled using sensors and a microprocessor. To keep
the fish healthy, the temperature must be at 25°C and the oxygen content needs to be 20 ppm
(parts per million). The tank contains a heater and an oxygen inlet controlled by a valve.
heater
oxygen supply
sensor A
sensor B
microprocessor
(a) Name the two sensors used in this application.
Sensor A
Sensor B
[2]
(b) Describe how the sensors and the microprocessor are used to maintain the correct
conditions in the fish tank.
[4]
(c) What safeguards are needed to stop the fish tank temperature rising too high?
[1]
© UCLES 2012
2210/01/SP/15
.
799
7
Ahmed uses the Internet for some time and is puzzled by the terminology.
(a) Draw a line to match each description to the appropriate technical term.
authoring language used to
create documents to be viewed
on the World Wide Web
Browser
computer that responds to
requests to provide information
and services over the Internet
HTML
defines how messages are
transmitted and formatted
over the Internet
MAC address
numerical ID for each device
on the Internet
Internet Server
software that enables users
to access/view documents and
other resources on the Internet
IP address
unique ID for a network
interface card
http
[5]
(b) Ahmed sees the message “Set your browser to accept cookies”.
Explain why some websites make this request.
[2]
© UCLES 2012
2210/01/SP/15
[Turn over
.
8100
8
Computer memories are measured in terms of the number of bytes.
(a) (i) What is meant by the term byte?
[1]
(ii) What is meant by the term Gigabyte?
[1]
(b) Flash memories and CD-RWs are used as backing media for computers.
Give two differences between these two media.
1
2
[2]
9
Andrew sends a large document to a printer.
(a) State the name for the area of memory used to store temporarily the data being sent to the
printer.
[1]
(b) The printer runs out of paper during the printing job. A signal is sent back to the computer to
stop temporarily its current task.
Name this type of signal.
[1]
© UCLES 2012
2210/01/SP/15
.
8111
10 In a simple symmetric encryption system, each letter of the alphabet is substituted with another.
The plain text message:
The quick brown fox jumps over the lazy dog.
becomes the cypher text message:
Zag towns jumpy dmh coilp mngu zag bfke qmx.
(a) (i) Decode this cypher text message.
Agbbm Pmubq
[2]
(ii) Convert these words to cypher text.
Computer Science
[2]
(b) Both the person who sends the message and the person who receives it need to know
what the substitution key is, and they need to keep this secret. A copy of the
substitution key has been sent using SSL transmission.
Explain why this keeps the copy of the key secret during transmission.
[2]
© UCLES 2012
2210/01/SP/15
[Turn over
.
8122
11 Five security or data loss issues are shown on the left-hand side.
Five possible methods of data recovery or protection are shown on the right.
Draw a line to match each definition/description of Issues to the most appropriate Methods of
Data Recovery.
Issues
Methods of Data Recovery
data loss caused by hard disk
head crash
anti-spyware software
hacking into files and changing
or deleting data
anti-virus software
introduction of software that
self-replicates and can cause
data loss
back-up files
reading of illegally accessed
documents
encryption
software that logs/records all
key presses on your computer
without you knowing
passwords and a firewall
[4]
© UCLES 2012
2210/01/SP/15
.
8133
12 Look at these two pieces of code:
A:
CLC
LDX
loop: LDA
ADC
STA
INX
CPX
BNE
#0
A,X
B,X
C,X
B: FOR Loop
INPUT
Sum =
PRINT
NEXT
= 1 TO 4
Number1, Number2
Number1 + Number2
Sum
#16
loop
(a) Which of these pieces of code is written in a high-level language?
[1]
(b) Give one benefit of writing code in a high-level language.
[1]
(c) Give one benefit of writing code in a low-level language.
[1]
(d) High-level languages can be compiled or interpreted.
Give two differences between a compiler and an interpreter.
1
2
[2]
© UCLES 2012
2210/01/SP/15
[Turn over
.
8144
13 When a key is pressed on the keyboard, the computer stores the ASCII representation of the
character typed into main memory.
The ASCII representation for A is 65 (denary), for B is 66 (denary), etc.
There are two letters stored in the following memory locations:
Location 1
B
Location 2
D
(a) (i) Show the contents of Location 1 and Location 2 as binary.
Location 1
Location 2
[2]
(ii) Show the contents of Location 1 and Location 2 as hexadecimal.
Location 1
Location 2
[2]
(b) The following machine code instruction is stored in a location of main memory:
1
1
0
1
1
0
1
1
1
0
0
1
1
1
1
1
Convert this binary pattern into hexadecimal.
[4]
(c) Explain why a programmer would prefer to see the contents of the locations displayed as
hexadecimal rather than binary, when debugging his program that reads the key presses.
[2]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
© UCLES 2012
2210/01/SP/15
.
825
1
(a) 1 mark for the correct working in BOTH parts
1 mark for valid
1 mark for not valid
Identification number 1: working
= (4 × 6) + (2 × 5) + (1 × 4) + (9 × 3) + (2 × 2) + (3 × 1)
= 24 + 10 + 4 + 27 + 4 + 3
= 72 ÷ 11
= 6 remainder 6
valid/not valid: NOT valid
Identification number 2: working
= (8 × 6) + (2 × 5) + (0 × 4) + (1 × 3) + (5 × 2) + (6 × 1)
= 48 + 10 + 0 + 3 + 10 + 6
= 77 ÷ 11
= 7 remainder 0
valid/not valid: VALID
[3]
(b) 1 mark for correct working + 1 mark for check digit
working
= (5 × 6) + (0 × 5) + (2 × 4) + (4 × 3) + (1 × 2)
= 30 + 0 + 8 + 12 + 2
= 52
need to add 3 to make the total 55 (i.e. exactly divisible by 11)
check digit: 3
[2]
(c) 1 mark for each description and example
2
–
–
2 digits transposed
(e.g. 280419 becomes 280149/two digits have been switched)
incorrect digit
(e.g. 280419 becomes 250419/one of the digits has been mistyped)
[2]
direct access because of concentric tracks
can read and write at the same time because it has a read/write head
[2]
© UCLES 2012
2210/01/SM/15
.
836
3
(a) 1 mark for each logic gate correctly connected
A
AND
NOT
Y
OR
T
AND
S
NOT
[5]
(b)
A
T
S
Y
0
0
0
0
0
0
1
0
0
1
0
1
0
1
1
0
1
0
0
1
1
0
1
1
1
1
0
1
1
1
1
0
}
]
]
]
]
1 mark
1 mark
1 mark
1 mark
[4]
4
(a) 1 mark for hours; 1 mark for minutes
1 6 : 4 9
1 mark 1 mark
[2]
(b) 1 mark for each digit
0
0
0
1
© UCLES 2012
0
1
0
0
0
1
1
0
1
1
0
1
1st digit
2nd digit
3rd digit
4th digit
[4]
2210/01/SM/15
[Turn over
.
847
5
(c) Any two from:
– microprocessor compares present time with stored time
– if the values are the same
– sends signal to sound alarm
[2]
(a) Yes
[1]
(b) No
[1]
(c) –
–
6
re-reading the byte that was sent
request that the byte is resent
[2]
(a) Only answers:
– temperature (sensor)
– oxygen (sensor)
[2]
(b) Any four from:
– information from the sensors sent to microprocessor
– the ADC converts the analogue data into digital form
– if temperature < 25ºC OR temperature checked against stored value
– ...microprocessor sends signal to heater/actuator/valve...
– ...to switch on heater
– if oxygen level < 20 ppm OR oxygen level checked against stored value
– ...to open valve/oxygen supply
– use of DAC between microprocessor and devices
– sounds an alarm if system unable to respond
– continuously monitors sensor inputs
– any reference to feedback
[4]
(c) Any one from:
– unsafe limit stored in memory
– warning sound/signal if too high a value reached
– fail safe switch off in case of a malfunction
[1]
© UCLES 2012
2210/01/SM/15
.
858
7
(a)
authoring language used to
create documents to be viewed
on the World Wide Web
Browser
computer that responds to
requests to provide information
and services over the Internet
HTML
defines how messages are
transmitted and formatted
over the Internet
MAC address
numerical ID for each device
on the Internet
Internet Server
software that enables users
to access/view documents and
other resources on the Internet
IP address
unique ID for a network
interface card
http
5/6 matches – 5 marks
4 matches – 4 marks
3 matches – 3 marks
2 matches – 2 marks
1 match – 1 mark
[5]
(b) any two from:
– to enable logon information to be kept on his computer
– to provide pages customised for Ahmed the next time he logs on
– to implement shopping carts and one-click purchasing
– to be able to distinguish between new and repeat visitors to the website
© UCLES 2012
2210/01/SM/15
[2]
[Turn over
.
869
8
(a) (i) Any one from:
– unit of data/memory
– 8 bits
– used to represent a character
(ii) Any one from:
– 230 bytes
– 1 073 741 824 bytes
– 1 048 576 kilobytes
– 1024 megabytes
[1]
[1]
(b) Any two from:
Flash memory
– solid state memory
– no formatting issues
– plugs directly into the USB port
– direct transfer of data
CD-RW
– optical media
– slower access speed/flash memory has faster access speed
– requires a separate drive
– data needs to be burnt/finalised/finished (before being used on another device)
9
[2]
(a) Any one from:
– buffer
– RAM
[1]
(b) –
[1]
interrupt
10 (a) 1 mark for each correct word
(i) Hello World
[2]
(ii) Nmilozgu Pnwgyng
[2]
(b) –
–
© UCLES 2012
use of Secure Socket Layer
the key itself is encrypted using strong encryption
2210/01/SM/15
[2]
.
970
11
data loss caused by hard disk
head crash
anti-spyware software
hacking into files and changing or
deleting data
anti-virus software
introduction of software that
self-replicates and can cause
data loss
back-up files
reading of illegally accessed
documents
encryption
software that logs/records all
key presses on your computer
without you knowing
passwords and a firewall
5/4 matches – 4 marks
3 matches – 3 marks
2 matches – 2 marks
1 match – 1 mark
[4]
12 (a) code B
[1]
(b) Any one from:
– no need to understand workings of a computer
– easier to understand for programmer/closer to English
– much easier to debug
– much easier to test
– one-to-many when writing commands
– not machine-specific/portable
[1]
(c) Any one from:
– can address memory addresses directly
– no need for compilers/interpreters
– shorter code/code requires less storage/RAM
– can be written to run faster
[1]
© UCLES 2012
2210/01/SM/15
[Turn over
.
981
(d) –
–
–
–
–
compiler produces object code / interpreter doesn’t produce object code
compiler translates whole program in one go / interpreter translates and executes line at
a time
compiler produces list of all errors / interpreter produces error message each time an
error encountered
compiler produces “stand alone code” / interpreter doesn’t produce “stand alone code”
compilation process is slow but resultant code runs very quickly / interpreted code runs
slowly
[2]
13 (a) (i) 01000001
01000011
[2]
(ii) 41
43
[2]
(b) FA97
[4]
(c) –
–
[2]
© UCLES 2012
easier to identify values
easier to spot errors
2210/01/SM/15
.
92
Cambridge International Examinations
Cambridge Ordinary Level
2210/02
COMPUTER SCIENCE
Paper 2 Problem-solving and Programming
For Examination from 2015
SPECIMEN PRE-RELEASE MATERIAL
No Additional Materials are required.
This material should be given to candidates up to six months before the examination.
READ THESE INSTRUCTIONS FIRST
Candidates should use this material in preparation for the examination. Candidates should attempt the
practical programming tasks using their chosen high-level, procedural programming language.
This document consists of 2 printed pages.
© UCLES 2012
[Turn over
.
923
Candidates’ preparation for the examination should include attempting the following practical
program coding tasks.
Write and test a program to complete the three tasks.
TASK 1
Input and store the names and marks for 30 students who have sat three computer science tests.
Test 1 is out of 20 marks, Test 2 is out of 25 marks, Test 3 is out of 35 marks. You must store the
names in a one-dimensional array and the marks and total score for each student in one-dimensional
arrays. All the marks must be validated on entry and any invalid marks rejected. You may assume
that the students’ names are unique.
TASK 2
Calculate and store the total score for each student and calculate the average score for the whole
class. Output each student’s name followed by their total score, then output the average score for the
class.
TASK 3
Select the student with the highest score and output their name and score.
Your program must include appropriate prompts for the entry of data. Error messages and other
output need to be set out clearly and understandably. All variables, constants and other identifiers
must have meaningful names. Each task must be fully tested.
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
© UCLES 2012
2210/02/SP/15
.
94
Cambridge International Examinations
Cambridge Ordinary Level
COMPUTER SCIENCE
Paper 2 Problem-solving and Programming
2210/02
For Examination from 2015
SPECIMEN PAPER
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
Calculators must not be used in this paper.
Answer all questions.
DO NOT ATTEMPT TASKS 1, 2 AND 3 in the pre-release material; these are for information only.
You are advised to spend no more than 40 minutes on Section A (Question 1).
No marks will be awarded for using brand names of software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
This document consists of 13 printed pages and 3 blank pages.
© UCLES 2012
[Turn over
.
935
Section A
You are advised to spend no longer than 40 minutes answering this section.
Here is a copy of the pre-release material.
DO NOT attempt Tasks 1, 2 and 3 now.
Use the pre-release material and your experience from attempting the tasks before the examination to
answer Section A Question 1.
Pre-release material
Write and test a program to complete the three tasks.
TASK 1
Input and store the names and marks for 30 students who have sat three computer science tests.
Test 1 is out of 20 marks, Test 2 is out of 25 marks, Test 3 is out of 35 marks. You must store the
names in a one-dimensional array and the marks and total score for each student in one-dimensional
arrays. All the marks must be validated on entry and any invalid marks rejected. You may assume
that the students’ names are unique.
TASK 2
Calculate and store the total score for each student and calculate the average score for the whole
class. Output each student’s name followed by their total score, then output the average score for the
class.
TASK 3
Select the student with the highest score and output their name and score.
Your program must include appropriate prompts for the entry of data. Error messages and other
output need to be set out clearly and understandably. All variables, constants and other identifiers
must have meaningful names. Each task must be fully tested.
© UCLES 2012
2210/02/SP/15
[Turn over
.
946
1
(a) All variables, constants and other identifiers should have meaningful names.
(i) Declare the array to store the students’ names.
[1]
(ii) Declare the arrays to store each student’s marks and total score.
[2]
(b) (i) Show the design of your algorithm to complete Task 1 and Task 2 using pseudocode,
programming statements or a flowchart. Do not include any of the validation checks in
your algorithm.
[8]
© UCLES 2012
2210/02/SP/15
.
957
(ii) Comment on the efficiency of your design.
[1]
(c) Show two different sets of student data that you could use to check the validation used in
Task 1. Explain why you chose each data set.
Set 1
Reason for choice
Set 2
Reason for choice
[2]
© UCLES 2012
2210/02/SP/15
[Turn over
.
968
(d) (i) Explain how you select the student with the highest score (Task 3). You may include
pseudocode or programming statements to help illustrate your explanation.
[5]
(ii) How does your program work when there is more than one student having the highest
score? Explain using your method given in part (d)(i).
[1]
© UCLES 2012
2210/02/SP/15
.
979
Section B
2
Jatinder uses Internet banking.
This pseudocode checks her PIN.
c ← 0
INPUT PIN
x ← PIN
REPEAT
x ← x/10
c ← c + 1
UNTIL x < 1
IF c <> 5
THEN
PRINT “error in PIN entered”
ELSE
PRINT “PIN OK”
ENDIF
(a) What value of c and what message would be output if the following PINs were entered?
5 1 0 2 0 Value of c:
Message:
5120
Value of c:
Message:
[2]
(b) What type of validation check is being carried out here?
[1]
© UCLES 2012
2210/02/SP/15
[Turn over
.
8
100
3
The flowchart inputs the size of a number of car engines; a value of –1 stops the input.
This information is output: average engine size and number of engines with size > 1.5
START
Engine ← 0
Count ← 0
Number ← 0
INPUT Size
is Size
= –1 ?
Yes
Average ← Engine/Number
OUTPUT
Average, Count
No
is Size
> 1.5 ?
Yes
STOP
Count ← Count + 1
No
Number ← Number + 1
Engine ← Engine + Size
© UCLES 2012
2210/02/SP/15
.
9
101
Complete the trace table for the input data.
1.8, 2.0, 1.0, 1.3, 1.0, 2.5, 2.0, 1.3, 1.8, 1.3,
Engine
Count
Number
Size
–1
Average
OUTPUT
[6]
© UCLES 2012
2210/02/SP/15
[Turn over
.
110
02
4
Read this section of program code that inputs twenty (20) numbers and then outputs the largest
number input.
1
h = 0
2
c = 0
3
REPEAT
4
READ x
5
IF x > h THEN x = h
6
c = c + 1
7
PRINT h
8
UNTIL c < 20
There are three errors in this code.
Locate these errors and suggest a corrected piece of code.
1
2
3
[3]
© UCLES 2012
2210/02/SP/15
.
114
03
6
(a) Write an algorithm, using pseudocode or flowchart only, which:
•
•
inputs three numbers
outputs the largest of the three numbers
[3]
(b) Write an algorithm, using pseudocode or flowchart only, which:
•
•
inputs 1000 numbers
outputs how many of these numbers were whole numbers (integers)
(You may use INT(x) in your answer, e.g. y = INT(3.8) gives the value y = 3)
[4]
© UCLES 2012
2210/02/SP/15
.
115
04
(c) Describe, with examples, two sets of test data you would use to test your algorithm.
1
2
[2]
7
A database was set up to show the properties of certain chemical elements. Part of the database
is shown below.
Name of
element
Element
symbol
Atomic
number
Atomic
weight
Melting
point (C)
Boiling
point (C)
State at
room temp
oxygen
O
8
16
–218
–183
gas
iron
Fe
26
56
1538
2861
solid
mercury
Hg
80
201
–38
356
liquid
bromine
Br
35
80
–7
59
liquid
osmium
Os
76
190
3033
5012
solid
caesium
Cs
55
133
28
671
solid
gallium
Ga
31
70
30
2204
solid
argon
Ar
18
40
–189
–186
gas
silver
Ag
47
108
961
2162
solid
(a) How many fields are in each record?
[1]
(b) The following search condition was entered:
(Melting point (C) < 40) AND (Atomic weight > 100)
Using Element symbol only, which records would be output?
[2]
(c) Which field would be best suited as primary key?
[1]
© UCLES 2012
2210/02/SP/15
.
2
105
Section A
1
(a) (i) Many correct answers, they must be meaningful. This is an example only.
StudentNames[1:30]
[1]
(ii) Many correct answers, they must be meaningful. This is an example only.
StudentMarksTest1[1:30]
StudentMarksTest2[1:30]
StudentMarksTest3[1:30] (1 mark)
StudentTotalScore[1:30] (1 mark)
[2]
(b) (i) –
–
–
–
–
–
–
–
outside loop zeroing total for loop (sum in example below)
loop for all students
input name and all test scores
in loop adding a student’s total
storing the total
inside loop printing student’s name and total
outside loop calculating class average
printing class average
sample algorithm:
Sum 0
FOR Count 1 TO 30
INPUT Name
StudentName[Count] Name
INPUT Mark1, Mark2, Mark3
StudentMarksTest1[Count] Mark1
StudentMarksTest2[Count] Mark2
StudentMarksTest3[Count] Mark3
Total Mark1 + Mark2 + Mark3
StudentTotalScore[Count] Total
Sum Sum + Total
PRINT StudentName[Count], StudentTotalScore[Count]
NEXT Count
ClassAverage = Sum/30
PRINT ClassAverage
(ii) any relevant comment with regards to efficient code (e.g. single loop)
(c)
[8]
[1]
Many correct answers, these are examples only.
1 mark per data set and reason
Set 1:
20, 25, 30, 35
Reason: valid data to check that data on the upper bound of each range check is
accepted
Set 2:
21, 26, 31, 36
Reason: invalid data to check that data above the upper bound of each range check is
rejected
[2]
© UCLES 2012
2210/02/SM/15
.
3
106
(d) (i) Maximum 5 marks in total for question part
Maximum 3 marks for algorithm
Description (max 3)
– set variable called HighestScore to zero and variable called BestName to dummy
value
– loop 30 times to check each student’s total score in turn
– check student’s score against HighestScore
– if student’s score > HighestScore then
– … replace value in HighestScore by student’s score and store student’s name in
BestName
– output BestName and HighestScore outside the loop
Sample algorithm (max 3):
HighestScore 0
BestName “xxxx”
FOR Count 1 TO 30
IF StudentTotalScore[Count] > HighestScore
THEN
HighestScore StudentTotalScore[Count]
BestName StudentName[Count]
ENDIF
NEXT Count
PRINT BestName, HighestScore
If algorithm or program code only, then maximum 3 marks
(ii) comment on which student(s)’ name will be output
e.g. The first student with the highest score will be output
© UCLES 2012
2210/02/SM/15
(1 mark)
(1 mark)
(1 mark)
(1 mark)
(1 mark)
[5]
[1]
[Turn over
.
4
107
Section B
2
(a) 1 mark for value of c and message
51020: value of c:
message:
5
PIN OK
(1 mark)
5120:
4
error in PIN entered
(1 mark)
value of c:
message:
[2]
(b) length check
[1]
3
Engine
Count
Number
Size
0
0
0
1.8
1.8
1
1
2.0
3.8
2
2
1.0
4.8
3
1.3
6.1
4
1.0
7.1
5
2.5
9.6
3
6
2.0
11.6
4
7
1.3
8
1.8
9
1.3
10
–1
12.9
14.7
5
16.0
Average
OUTPUT
1.6
(1 mark)
4
(1 mark)
(1 mark)
(1 mark)
(1 mark)
1.6, 5
(1 mark)
[6]
1 mark for each error identified + suggested correction
line 5:
this should read IF x > h THEN h = x
line 7:
PRINT h should come after the end of the repeat loop
line 8:
this should read UNTIL c = 20 or UNTIL c >= 20 or UNTIL c > 19
© UCLES 2012
2210/02/SM/15
[3]
.
6
108
6
(a) marking points:
the way to find and print the largest value a
the way to find and print the largest value b
the way to find and print the largest value c
sample algorithm:
INPUT a, b, c
IF a > b AND a > c THEN PRINT a
ELSE IF b > c THEN PRINT b
ELSE PRINT c
(b) marking points:
loop construct
check if number is an integer
counting the number of integers input
output count value (outside the loop)
sample algorithm:
FOR x ← 1 TO 1000
INPUT Number
Difference ← INT(number) – Number
IF Difference = 0 THEN Total ← Total + 1
NEXT x
PRINT total
(NOTE: alternative to lines 3 and 4:
IF INT(Number) = Number THEN Total ← Total + 1
1 mark
1 mark
1 mark
(1 mark)
(1 mark)
(1 mark)
[3]
1 mark
1 mark
1 mark
1 mark
(1 mark)
(1 mark)
(1 mark)
(1 mark)
(2 marks) )
[4]
(c) Description of any two sets of test data. Many correct answers, these are examples only.
1000 whole numbers to ensure that loop works properly
900 whole numbers and 100 numbers with decimal places to ensure that the routine
distinguishes correctly
[2]
7
(a) 7
[1]
(b) Hg, Cs
[2]
(c) Element symbol
[1]
© UCLES 2012
2210/02/SM/15
.
109
Cambridge International Examinations
Cambridge Ordinary Level
* 0 7 5 8 6 0 9 9 9 5 *
2210/11
COMPUTER SCIENCE
Paper 1 Theory
May/June 2015
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
Answer all questions.
No marks will be awarded for using brand names of software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The maximum number of marks is 75.
This document consists of 15 printed pages and 1 blank page.
DC (LEG/CGW) 111631
© UCLES 2015
[Turn over
.
2
110
1
(a) State what is meant by the terms:
Parallel data transmission .........................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Serial data transmission ...........................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
(b) Give one benefit of each type of data transmission.
Parallel data transmission
Benefit .......................................................................................................................................
...................................................................................................................................................
Serial data transmission
Benefit .......................................................................................................................................
...................................................................................................................................................
[2]
(c) Give one application of each type of data transmission. Each application must be different.
Parallel data transmission
Application ................................................................................................................................
...................................................................................................................................................
Serial data transmission
Application ................................................................................................................................
...................................................................................................................................................
[2]
© UCLES 2015
2210/11/M/J/15
.
3
111
2
(a) State what is meant by the term USB.
...................................................................................................................................................
...................................................................................................................................................
[1]
(b) Describe two benefits of using USB connections between a computer and a device.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
© UCLES 2015
2210/11/M/J/15
[Turn over
.
4
112
3
(a) Complete the truth table for the following logic circuit:
A
X
B
C
Workspace
A
B
C
0
0
0
0
0
1
0
1
0
0
1
1
1
0
0
1
0
1
1
1
0
1
1
1
X
[4]
© UCLES 2015
2210/11/M/J/15
.
5
113
(b) Draw a logic circuit which corresponds to the following logic statement:
X = 1 if ((A is NOT 1 OR B is 1) AND C is 1) OR (B is NOT 1 AND C is 1)
A
B
X
C
[3]
(c) Write a logic statement which corresponds to the following logic circuit:
A
B
X
C
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
© UCLES 2015
2210/11/M/J/15
[Turn over
.
6
114
4
Choose six correct terms from the following list to complete the spaces in the paragraphs below:
•
encryption
•
file name
•
firewall
•
HTML tags/text
•
IP address
•
protocol
•
proxy server
•
SSL certificate
•
web server name
A user enters a URL. The web browser breaks up the URL into three components:
1 ........................................................
2 ........................................................
3 ........................................................
The web server returns the selected web page.
The web browser reads the ............................................................ from the selected page and
shows the correctly formatted page on the user’s screen.
A ............................................................ is used between the user’s computer and the network to
examine the data traffic to make sure it meets certain criteria.
To speed up the access to the web pages next time, a ............................................................ is
used between the computer and web server; this device uses a cache to store the website home
page after it has been accessed for the first time.
[6]
© UCLES 2015
2210/11/M/J/15
.
7
115
5
Five storage devices are described in the table below.
In column 2, name the storage device being described.
In columns 3, 4, or 5, tick () to show the appropriate category of storage.
1
2
Description of storage device
Name of
storage device
3
4
5
Category of storage
Primary
Secondary
Off-line
optical media which use one spiral
track; red lasers are used to read
and write data on the media surface;
makes use of dual-layering technology
to increase the storage capacity
non-volatile memory chip; contents of
the chip cannot be altered; it is often
used to store the start up routines in a
computer (e.g. the BIOS)
optical media which use concentric
tracks to store the data; this allows
read and write operations to be carried
out at the same time
non-volatile memory device which
uses NAND flash memories (which
consist of millions of transistors wired
in series on single circuit boards)
optical media which use blue laser
technology to read and write data on
the media surface; it uses a single
1.1 mm polycarbonate disc
[10]
© UCLES 2015
2210/11/M/J/15
[Turn over
.
8
116
6
(a) Viruses, pharming and phishing are all examples of potential Internet security issues.
Explain what is meant by each of these three terms.
Virus .........................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Pharming ..................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Phishing ....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
(b) An online bank requires a client to supply an 8-digit code each time they wish to access their
account on the bank’s website.
Rather than ask the client to use a keyboard, they are requested
to use an on-screen keypad (shown on the right) to input the
8-digit code.
The position of the digits on the keypad can change each time
the website is visited.
The client uses a mouse or touch screen to select each of the
8 digits.
(i)
2
5
1
6
8
3
9
0
4
7
Explain why the bank has chosen to use this method of entering the 8 digits.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
© UCLES 2015
2210/11/M/J/15
.
9
117
(ii)
Name and describe another measure that the bank could introduce to improve the
security of their website.
Name .................................................................................................................................
Description ........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
© UCLES 2015
2210/11/M/J/15
[Turn over
.
110
18
7
(a) One of the key features of von Neumann computer architecture is the use of buses.
Three buses and three descriptions are shown below.
Draw a line to connect each bus to its correct description.
Bus
Description
address bus
this bus carries signals used
to coordinate the computer’s
activities
control bus
this bi-directional bus is used
to exchange data between
processor, memory and input/
output devices
data bus
this uni-directional bus carries
signals relating to memory
addresses between processor
and memory
[2]
© UCLES 2015
2210/11/M/J/15
.
111
19
(b) The seven stages in a von Neumann fetch-execute cycle are shown in the table below.
Put each stage in the correct sequence by writing the numbers 1 to 7 in the right hand column.
The first one has been done for you.
Stage
Sequence
number
the instruction is then copied from the memory location contained
in the MAR (memory address register) and is placed in the MDR
(memory data register)
the instruction is finally decoded and is then executed
the PC (program counter) contains the address of the next instruction
to be fetched
1
the entire instruction is then copied from the MDR (memory data
register) and placed in the CIR (current instruction register)
the address contained in the PC (program counter) is copied to the
MAR (memory address register) via the address bus
the address part of the instruction, if any, is placed in the MAR
(memory address register)
the value in the PC (program counter) is then incremented so that it
points to the next instruction to be fetched
[6]
© UCLES 2015
2210/11/M/J/15
[Turn over
.
112
20
8
An alarm clock is controlled by a microprocessor. It uses the 24 hour clock. The hour is represented
by an 8-bit register, A, and the number of minutes is represented by another 8-bit register, B.
(a) Identify what time is represented by the following two 8-bit registers.
A
128
64
32
16
B
8
4
2
1
128
64
32
16
8
4
2
1
0 0 0 1 0 0 1 0 : 0 0 1 1 0 1 0 1
Hours ............................................
Minutes .........................................
[2]
(b) An alarm has been set for 07:30. Two 8-bit registers, C and D, are used to represent the
hours and minutes of the alarm time.
Show how 07:30 would be represented by these two registers:
C
D
:
Hours
Minutes
[2]
(c) Describe how the microprocessor can determine when to sound the clock alarm.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
© UCLES 2015
2210/11/M/J/15
.
113
21
(d) The LCD (liquid crystal display) on the clock face is back-lit using blue LEDs (light emitting
diodes). The brightness of the clock face is determined by the level of light in the room. The
amount of light given out by the LEDs is controlled by a control circuit.
Describe how the sensor, microprocessor and LEDs are used to maintain the correct
brightness of the clock face.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(e) Modern LCD monitors and televisions use LED back-lit technology.
Give two advantages of using this new technology compared to the older cold cathode
fluorescent lamp (CCFL) method.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
© UCLES 2015
2210/11/M/J/15
[Turn over
.
114
22
9 Draw a line to connect each question to the correct answer.
Answer
Question
What is the denary (base 10)
equivalent to the hexadecimal
digit E?
8
If 1 GB = 2x then what is the
value of X?
12
How many bits are there in one
byte?
14
If the broadband data download
rate is 40 megabits per second,
how many seconds will it take to
download a 60 MB file?
19
What is the denary (base 10)
value of the binary number
30
00100100?
What hexadecimal value
is obtained when the two
hexadecimal digits C and D
are added together?
36
[5]
© UCLES 2015
2210/11/M/J/15
.
115
23
10 Five statements about interpreters and compilers are shown in the table below.
Study each statement.
Tick () to show whether the statement refers to an interpreter or to a compiler.
Statement
Interpreter
Compiler
takes one statement at a time and executes it
generates an error report at the end of translation of the
whole program
stops the translation process as soon as the first error is
encountered
slow speed of execution of program loops
translates the entire program in one go
[5]
© UCLES 2015
2210/11/M/J/15
1
.
Mark Scheme
124
Cambridge O Level – May/June 2015
Page 2
(a) parallel
Syllabus
2210
Paper
11
any one from:
–
–
8 bits/1 byte/multiple bits sent at a time
using many/multiple/8 wires/lines
(1 mark)
serial
any one from:
–
–
one bit sent at a time
over a single wire
(1 mark)
[2]
(b) parallel
–
faster rate of data transmission
(1 mark)
serial
any one from:
–
–
–
more accurate/fewer errors over a longer distance
less expensive wiring
less chance of data being skewed/out of synchronisation/order
(1 mark)
[2]
(c) parallel
any one from:
–
–
sending data from a computer to a printer
internal data transfer (buses)
(1 mark)
serial
–
connect computer to a modem
© Cambridge International Examinations 2015
(1 mark)
[2]
2
.
Mark Scheme
125
Cambridge O Level – May/June 2015
Page 3
(a) –
–
universal serial bus
description of USB
Syllabus
2210
Paper
11
[1]
(b) Any two from:
–
–
–
–
–
–
–
–
3
devices are automatically detected and configured when initially attached
impossible to connect device incorrectly/connector only fits one way
has become the industry standard
supports multiple data transmission speeds
lots of support base for USB software developers
supported by many operating systems
backward compatible
faster transmission compared to wireless
[2]
(a)
Working
A
B
C
0
0
0
0
0
1
0
1
0
0
1
1
1
0
0
1
0
1
1
1
0
1
1
1
X
1
0
0
0
0
1
1
1
] 1 mark
] 1 mark
] 1 mark
] 1 mark
[4]
© Cambridge International Examinations 2015
.
Mark Scheme
126
Cambridge O Level – May/June 2015
Page 4
(b) 1 mark per dotted section
Syllabus
2210
Paper
11
A
B
X
C
[3]
(c) X is 1 if:
(A is 1 OR B is 1)
(1 mark)
AND
(1 mark)
(B is 1 OR C is NOT 1)
(1 mark)
accept equivalent ways of writing this:
e.g. (A OR B = 1)
AND (B OR NOT C = 1)
e.g. (A OR B)
AND (B OR NOT C)
e.g. (A + B) (B + C)
© Cambridge International Examinations 2015
[3]
4
.
Mark Scheme
127
Cambridge O Level – May/June 2015
Page 5
1 mark per correct word
1
protocol
2
web server name
3
file name
Syllabus
2210
Paper
11
accept these three items in any order
HTML tags/text
firewall
proxy server
[6]
5
1 mark per device, 1 mark per category
Description of storage device
Name of
storage device
Category of storage
Primary
optical media which uses one spiral
track; red lasers are used to read and
write data on the media surface; makes
use of dual-layering technology to
increase the storage capacity
non-volatile memory chip; contents of
the chip cannot be altered; it is often
used to store the start-up routines in a
computer (e.g. the BIOS)
optical media which uses concentric
tracks to store the data; this allows read
and write operations to be carried out at
the same time
non-volatile memory device that uses
NAND flash memories (which consist of
millions of transistors wired in series on
single circuit boards)
DVD
DVD-RAM
Solid State
Drive/memory
(SSD)
Blue-ray
Off-line
ROM
(SD/XD card)
(USB storage
device)
optical media that uses blue laser
technology to read and write data on
the media surface; it uses a single 1.1
mm polycarbonate disc
Secondary
()
()
[10]
© Cambridge International Examinations 2015
.
Mark Scheme
128
Cambridge O Level – May/June 2015
Page 6
6
(a) virus
Syllabus
2210
Paper
11
any two from:
–
–
–
program/software that replicates/copies itself
can delete or alter files/data stored on a computer
can make the computer “crash”/run slow
pharming
any two from:
–
–
–
malicious code/software installed on a user’s hard drive/actual web server
this code redirects user to a fake website (without their knowledge)
to obtain personal/financial information/data
phishing
any two from:
–
–
–
–
legitimate-looking emails sent to a user
as soon as recipient opens/clicks on link in the email/attachment …
… the user is directed to a fake website (without their knowledge)
To obtain personal/financial information/data
[6]
(b) (i) Any two from:
–
spyware/key logging software can only pick up key presses
–
using mouse/touchscreen means no key presses to log
–
the numbers on the key pad are in random/non-standard format,
which makes it more difficult to interpret
© Cambridge International Examinations 2015
[2]
Page 7
.
Mark Scheme
129
Cambridge O Level – May/June 2015
Syllabus
2210
Paper
11
(ii) 1 mark for name and 1 mark for description
any one from:
chip and PIN reader
– only the user and the bank know which codes can be generated
request user name
– additional security together with password/PIN
anti-virus
– removes/warns of a potential virus threat which can’t be passed on to
customers
firewall
– (helps) to protect bank computers from virus threats and hacking
encryption
– protects customer data by making any hacked information unreadable
security protocol
– governs the secure transmission of data
Biometric
– to recognise user through the use of, e.g. facial/retina/finger print
Alerts
– users IP/MAC address is registered and user is alerted through, e.g. SMS if
account is accessed through an unregistered address
[2]
7
(a)
this bus carries signals used to
coordinate the computer’s
activities
address bus
this bi-directional bus is used to
exchange data between
processor, memory and
input/output devices
control bus
this uni-directional bus carries
signals relating to memory
addresses between processor
and memory
data bus
2/3 matches – 2 marks
1 match – 1 mark
[2]
© Cambridge International Examinations 2015
.
Mark Scheme
130
Cambridge O Level – May/June 2015
Page 8
(b)
Syllabus
2210
description of stage
Paper
11
sequence
number
the instruction is then copied from the memory location contained in the
MAR (memory address register) and is placed in the MDR (memory data
register)
3
the instruction is finally decoded and is then executed
7
the PC (program counter) contains the address of the next instruction to be
fetched
(1)
the entire instruction is then copied from the MDR (memory data register)
and placed in the CIR (current instruction register)
4
the address contained in the PC (program counter) is copied to the MAR
(memory address register) via the address bus
2
the address part of the instruction is placed in the MAR (memory address
register)
6
the value in the PC (program counter) is then incremented so that it points
to the next instruction to be fetched
5*
The incrementation of the program counter can appear at any stage after 2. All other
stages must be in the correct given order.
8
(a) hours:
[6]
18
minutes:
53
[2]
(b)
hours (“C”)
0
0
0
0
0
1
minutes (“D”)
1
1
:
0
0
0
1
1
1
1
0
[2]
© Cambridge International Examinations 2015
.
Mark Scheme
131
Cambridge O Level – May/June 2015
Page 9
(c) Any three from:
Syllabus
2210
Paper
11
–
reads values in registers “C” and “D”
–
and checks the values against those stored in registers “A” and “B”
(NOTE: the first two statements can be interchanged, i.e. “A” and “B” read first)
–
If values in corresponding registers are the same
–
the microprocessor sends a signal to sound alarm/ring
[3]
(d) Any three from:
–
uses a light sensor
–
sends signal/data back to microprocessor
–
signal/data converted to digital (using ADC)
–
value compared by microprocessor with pre-set/stored value
–
if value < stored value, signal sent by microprocessor …
–
… to the voltage supply (unit)
–
… “value” of signal determines voltage supplied/brightness of LED
[3]
(e) Any two from:
–
no need to warm up
–
whiter tint/more vivid colours/brighter image
–
higher resolution
–
much thinner monitors possible/lighter weight
–
more reliable technology/longer lasting
–
uses much less power/more efficient
© Cambridge International Examinations 2015
[2]
.
Mark Scheme
132
Cambridge O Level – May/June 2015
Page 10
9
What is the denary (base 10)
equivalent to the hexadecimal
digit “E”?
x
If 1 GByte = 2
value of X?
then what is the
Syllabus
2210
8
12
The number of bits in one byte
14
If the broadband data download
rate is 40 megabits/ second; how
long will it take to download a 60
MByte file?
19
What is the denary (base 10)
value of the binary number:
0 0 1 0 0 1 0 0?
What hexadecimal value is
obtained when the two
hexadecimal digits, C and D, are
added together?
Paper
11
30
36
5/6 matches – 5 marks
4 matches – 4 marks
3 matches – 3 marks
2 matches – 2 marks
1 match – 1 mark
[5]
© Cambridge International Examinations 2015
Page 11
.
Mark Scheme
133
Cambridge O Level – May/June 2015
10 1 mark per correctly placed tick
statement
Syllabus
2210
interpreter
takes one statement at a time and executes it
compiler
generates an error report at the end of translation of the
whole program
stops the translation process as soon as the first error is
encountered
slow speed of execution of program loops
translates the entire program in one go
Paper
11
[5]
© Cambridge International Examinations 2015
.
134
Cambridge International Examinations
Cambridge Ordinary Level
* 9 4 7 0 5 3 9 2 0 0 *
2210/12
COMPUTER SCIENCE
Paper 1 Theory
May/June 2015
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
Answer all questions.
No marks will be awarded for using brand names of software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The maximum number of marks is 75.
This document consists of 14 printed pages and 2 blank pages.
DC (RW) 111393
© UCLES 2015
[Turn over
.
2
135
1
(a) Four statements about cookies are shown in the table below.
Study each statement.
Tick (✓) to show whether the statement is true or false.
Statement
True
False
they are a form of spyware
they are used only in advertising
they are used to track browser use
they act in the same way as a virus
[4]
(b) Five descriptions and five security issues are shown below.
Draw a line to connect each description to the correct security issue.
Description
Security issue
malicious code installed on the hard drive of a
user’s computer or on the web server; this code
will re-direct user to a fake web site without their
consent
hacking
software that gathers information by monitoring
key presses on a user’s computer and relays
the information back to the person who sent the
software
pharming
program or code that replicates itself and is
designed to amend, delete or copy data and files
on a user’s computer without their consent
phishing
the act of gaining illegal access to a computer
system without the owner’s consent
spyware
creator of code sends out a legitimate-looking
email in the hope of gathering personal and
financial data; it requires the recipient to follow a
link in the email or open an attachment
virus
[4]
© UCLES 2015
2210/12/M/J/15
.
3
136
2
The majority of mobile phones use touch screens. Three common technologies are used by
different mobile phone manufacturers.
Choose one of the following mobile phone technologies:
•
•
•
resistive
capacitive
infrared
Chosen technology ..........................................................................................................................
(i)
Describe how your chosen technology works to allow a user to make selections by touching
the screen.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(ii)
Give one benefit and one drawback of your chosen technology when used on mobile phone
touch screens.
Benefit
...................................................................................................................................................
...................................................................................................................................................
Drawback
...................................................................................................................................................
...................................................................................................................................................
[2]
© UCLES 2015
2210/12/M/J/15
[Turn over
.
4
137
3
Four input devices, four descriptions and four applications are shown below.
Draw a line to connect each input device to its correct description. Then connect each description
to its correct application.
Input device
Description
Application
barcode reader
copies paper documents and
converts the text and pictures
into a computer-readable form
voice
recognition
reads labels containing parallel
dark and light lines using laser
light or LEDs; the width of each
line represents a binary code
reading
passports
pH sensor
detects changes in acidity
levels; data is often in
analogue form
automatic stock
control
scanner
device that allows audio
signals to be converted into
electric signals; these can be
interpreted by a computer after
being converted into digital form
monitor soil in a
greenhouse
microphone
[6]
© UCLES 2015
2210/12/M/J/15
.
5
138
4
(a) State what is meant by the term SSL.
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[1]
(b) The following stages take place when a user wishes to access a secure website.
Put each stage in sequence by writing the numbers 1 to 6 in the column on the right. The first
one has been done for you.
Sequence
number
Stage
the encrypted data is then shared securely between the web browser
and the web server
the web browser attempts to connect to a website which is secured by
SSL
1
the web server sends the web browser a copy of its SSL certificate
the web browser requests the web server to identify itself
the web server will then send back some form of acknowledgement to
allow the SSL encrypted session to begin
the web browser checks whether the SSL certificate is trustworthy; if it
is, then the web browser sends a message back to the web server
[5]
© UCLES 2015
2210/12/M/J/15
[Turn over
.
6
139
5
Parity checks are often used to check for errors that may occur during data transmission.
(a) A system uses even parity.
Tick (✓) to show whether the following three bytes have been transmitted correctly or
incorrectly.
Received byte
Byte transmitted correctly
Byte transmitted incorrectly
11001000
01111100
01101001
[3]
(b) A parity byte is used to identify which bit has been transmitted incorrectly in a block of data.
The word “F L O W C H A R T” was transmitted using nine bytes of data (one byte per
character). A tenth byte, the parity byte, was also transmitted.
The following block of data shows all ten bytes received after transmission. The system uses
even parity and column 1 is the parity bit.
letter
column column column column column column column column
1
2
3
4
5
6
7
8
byte 1
F
1
0
1
0
0
1
1
0
byte 2
L
1
0
1
0
1
1
0
0
byte 3
O
1
0
1
0
1
1
1
1
byte 4
W
1
0
1
1
0
1
1
1
byte 5
C
1
0
1
0
0
0
1
1
byte 6
H
0
0
1
0
1
0
0
0
byte 7
A
0
0
1
0
0
1
0
1
byte 8
R
1
0
1
1
0
0
1
0
byte 9
T
1
0
1
1
0
1
0
0
1
0
1
1
1
1
1
0
parity
byte
(i)
One of the bits has been transmitted incorrectly.
Write the byte number and column number of this bit:
Byte number ......................................................................................................................
Column number .................................................................................................................
[2]
© UCLES 2015
2210/12/M/J/15
.
7
140
(ii)
Explain how you arrived at your answer for part (b)(i).
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(c) Give the denary (base 10) value of the byte: 1
0111110
...................................................................................................................................................
...............................................................................................................................................[1]
(d) A parity check may not identify that a bit has been transmitted incorrectly.
Describe one situation in which this could occur.
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[1]
© UCLES 2015
2210/12/M/J/15
[Turn over
.
8
141
6
A gas fire has a safety circuit made up of logic gates. It generates an alarm (X = 1) in response to
certain conditions.
Input
G
C
L
Description
Binary
value
Conditions
1
gas pressure is correct
0
gas pressure is too high
1
carbon monoxide level is correct
0
carbon monoxide level is too high
1
no gas leak is detected
0
gas leak is detected
gas pressure
carbon monoxide level
gas leak detection
The output X = 1 is generated under the following conditions:
gas pressure is correct AND carbon monoxide level is too high
OR
carbon monoxide level is correct AND gas leak is detected
(a) Draw a logic circuit for this safety system.
*
&
;
/
[5]
© UCLES 2015
2210/12/M/J/15
.
9
142
(b) Complete the truth table for the safety system.
Workspace
G
C
L
0
0
0
0
0
1
0
1
0
0
1
1
1
0
0
1
0
1
1
1
0
1
1
1
X
[4]
(c) Complete the truth table for the XOR gate:
A
B
0
0
0
1
1
0
1
1
C
[1]
© UCLES 2015
2210/12/M/J/15
[Turn over
.
110
43
7
(a) Street lighting is controlled automatically. A light sensor and a microprocessor are used to
decide when to switch each street light on or off.
Describe how the sensor, microprocessor and light interact to switch the street light on or off.
Include in your answer how the microprocessor stops the street lights being frequently
switched on and off due to brief changes in the light intensity.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
(b) Name three different sensors (other than light and pH) and describe an application for each
of these sensors.
A different application is needed for each sensor.
Sensor 1 ...................................................................................................................................
Application ................................................................................................................................
...................................................................................................................................................
Sensor 2 ...................................................................................................................................
Application ................................................................................................................................
...................................................................................................................................................
Sensor 3 ...................................................................................................................................
Application ................................................................................................................................
...................................................................................................................................................
[6]
© UCLES 2015
2210/12/M/J/15
.
111
44
8
Five computing terms are described below.
Write the name of the term being described.
Software that anyone can download for free from the Internet
and then use without having to pay any fees. The usual
copyright laws apply and a user license is important.
................................................
Software that gives the user the chance to try it out free of
charge before actually buying it. The software is subject to the
usual copyright laws. As a rule, not all the features found in the
full version are available at this stage.
................................................
Software where users have freedom to run, copy, change and
adapt it. This is an issue of liberty and not of price since the
software guarantees freedom and the right to study and modify
the software by having access to the actual source code.
................................................
Set of principles that regulates the use of computers in
everyday life. This covers intellectual property rights, privacy
issues and the effects of computers on society in general.
................................................
The taking of somebody’s idea or software and claim that the
idea or software code were created by the “taker”.
................................................
[5]
© UCLES 2015
2210/12/M/J/15
[Turn over
.
112
45
9
(a) Five statements about interpreters and compilers are shown in the table below.
Study each statement.
Tick (✓) to show whether the statement refers to an interpreter or to a compiler.
Statement
Interpreter
Compiler
creates an executable file that runs directly on the
computer
more likely to crash the computer since the machine
code produced runs directly on the processor
easier to debug since each line of code is analysed
and checked before being executed
slow speed of execution of program loops
it is more difficult to modify the executable code,
since it is in machine code format
[5]
(b) State why a compiler or an interpreter is needed when running a high-level program on a
computer.
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[1]
(c) Give one benefit of writing a program in a high-level language.
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[1]
(d) Give one benefit of writing a program in a low-level language.
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[1]
© UCLES 2015
2210/12/M/J/15
.
113
46
(e) Study the following three sections of code.
A:
1 0 1 0 1 1 0 1
1 1 0 0 1 1 1 0
1 0 1 1 0 1 1 1
B:
LDA X
INC X
STA Y
C:
FOR x ← 1 TO 10
READ n
ENDFOR
Identify, using the letters A, B or C, which of the above codes is an example of assembly
code, high-level language code or machine code:
Assembly code .........................................................................................................................
High-level language code .........................................................................................................
Machine code ...........................................................................................................................
[2]
© UCLES 2015
2210/12/M/J/15
[Turn over
.
114
47
10 Letters from the alphabet are represented in a computer by the following denary (base 10) values:
A
G
I
L
N
The word “A L I G N” is stored as: 97
=
=
=
=
=
108
97
103
105
108
110
105
103
110
(a) Convert each of the five values to binary. The first one has been done for you.
Letter
A (97):
Denary value
0
1
1
0
0
0
0
1
L (108):
I (105):
G (103):
N (110):
[2]
(b) An encryption system works by shifting the binary value for a letter one place to the left. “A”
then becomes:
1
1
0
0
0
0
1
0
This binary value is then converted to hexadecimal; the hexadecimal value for “A” will be:
C
2
For the two letters “L” and “G”, shift the binary values one place to the left and convert these
values into hexadecimal:
hexadecimal
L:
.............................................
G:
.............................................
[4]
© UCLES 2015
2210/12/M/J/15
Page 2
1
.
Mark Scheme
148
Cambridge O Level – May/June 2015
(a) 1 mark per correctly placed tick
Statement
Syllabus
2210
True
False
they are a form of spyware
they are used in advertising only
they are used to track the browsing of a user
they act in the same way as a virus
Paper
12
[4]
(b)
malicious code installed on the hard drive of a
user’s computer or on the web server; this code
will re-direct user to a fake web site without their
consent
hacking
software that gathers information by monitoring
key presses on a user’s computer and relays the
information back to the person who sent the
software
pharming
program or code that replicates itself and is
designed to amend/delete/copy data and files on
a user’s computer without their consent
phishing
the act of gaining illegal access to a computer
system without the owner’s consent
spyware
creator of code sends out a legitimate-looking
email in the hope of gathering personal and
financial data from the recipient; it requires the
email or attachment to be opened first
virus
4/5 matches – 4 marks
3 matches – 3 marks
2 matches – 2 marks
1 match – 1 mark
[4]
© Cambridge International Examinations 2015
.
Mark Scheme
149
Cambridge O Level – May/June 2015
Page 3
2
Syllabus
2210
Paper
12
(i) Either of the three options, resistive, capacitive or infra-red must be chosen
maximum of two marks from chosen technology:
resistive
− uses multiple layers of material …
− … that transmit electric currents
− when the top layer/screen is pushed/touched into the lower/bottom layer …
− … the electric current changes and location of “touch” is found
capacitive
− current sent/flows out from all 4 corners of the screen
− when finger/stylus touches screen, the current changes
− the location of “touch” is calculated
infra-red
− an “invisible” grid on the screen (pattern of infra-red LED beams)
− sensors detect where the screen has been touched through a break in an infrared
beam(s)
− the position where the screen touched is calculated
[2]
(ii) 1 mark for benefit, 1 mark for drawback
Resistive
benefits:
− inexpensive/cheap to manufacture
− can use stylus/finger/gloved finger/pen
drawbacks:
− poor visibility in sunlight
− vulnerable to scratching
− wears through time
− does not allow multi-touch facility
capacitive
benefits:
− good visibility in sunlight
− (very) durable surface
− allows multi-touch facility
drawbacks:
− screen (glass) will shatter/break/crack (on impact)
− cannot use when wearing (standard) gloves
infra-red
benefits:
− good durability
− allows multi-touch facility
− can use stylus/finger/gloved finger/pen
drawbacks:
− expensive to manufacture
− screen (glass) will shatter/break/crack (on impact)
− sensitive to dust/dirt
© Cambridge International Examinations 2015
[2]
.
Mark Scheme
150
Cambridge O Level – May/June 2015
Page 4
3
barcode
reader
microphone
Syllabus
2210
copies paper
documents and
converts the text and
pictures into a
computer-readable form
reads labels containing
parallel dark and light
lines using laser light;
the width of each line
represents a binary
code
Paper
12
voice
recognition
reading
passports
pH sensor
detects changes in
acidity levels; data is
often in analogue form
automatic
stock control
scanner
audio device that allows
audio signals to be
converted into electric
signals which can be
interpreted by a
computer after being
converted into digital
monitor soil in
a greenhouse
Input Device to Description
Description to Application
3/4 matches – 3 marks
2 matches – 2 marks
1 match – 1 mark
3/4 matches – 3 marks
2 matches – 2 marks
1 match – 1 mark
[6]
© Cambridge International Examinations 2015
4
.
Mark Scheme
151
Cambridge O Level – May/June 2015
Page 5
(a) Any one from:
−
−
−
−
Syllabus
2210
Paper
12
secure sockets layer
encrypts data being transmitted
use of https
use public and private keys
[1]
(b) 1 mark for each number in the correct order, next to the correct stage.
Stage
the encrypted data is then shared securely between the web browser and the
web server
the web browser attempts to connect to a web site which is secured by SSL
Sequence
number
6
(1)
the web server sends the web browser a copy of its SSL certificate
3
the web browser requests the web server to identify itself
2
the web server will then send back some form of acknowledgement to allow the
SSL encrypted session to begin
5
the web browser checks whether the SSL certificate is trustworthy; if it is then
the web browser sends a message back to the web server
4
[5]
© Cambridge International Examinations 2015
5
.
Mark Scheme
152
Cambridge O Level – May/June 2015
Page 6
(a) 1 mark per correctly placed tick
Received byte
Byte transmitted correctly
Syllabus
2210
Paper
12
Byte transmitted incorrectly
11001000
01111100
01101001
[3]
(b) (i) byte number:
7
column number: 6
[2]
(ii) Any two from:
−
−
−
letter “A”(byte 7) transmitted as odd parity (three 1s)
column 6 has odd parity (seven 1s)
intersection of byte 7 and column 6 indicates incorrect bit value
[2]
(c) 190
[1]
(d) Any one from:
−
−
−
2 bits interchanged (e.g. 1 → 0 and 0 → 1) that won’t change parity value
even number of bits/digits are transposed
If there are multiple errors in the same byte/column, that still produce the same parity bit,
the error will not be detected
[1]
© Cambridge International Examinations 2015
.
Mark Scheme
153
Cambridge O Level – May/June 2015
Page 7
6
Syllabus
2210
Paper
12
(a) 1 mark per correct logic gate, correctly connected
G
C
X
L
[5]
(b)
G
C
L
Workspace
X
0
0
0
0
0
0
1
0
0
1
0
1
0
1
1
0
1
0
0
1
1
0
1
1
1
1
0
1
1
1
1
0
] 1 mark
] 1 mark
] 1 mark
] 1 mark
[4]
© Cambridge International Examinations 2015
.
Mark Scheme
154
Cambridge O Level – May/June 2015
Page 8
Syllabus
2210
Paper
12
(c) 1 mark for correctly completed truth table
A
B
C
0
0
0
0
1
1
1
0
1
1
1
0
[1]
7 (a)
Maximum 5 marks in total for question part
Description of how street light is controlled: (max 4 marks)
−
−
−
−
−
−
−
sensor sends signal/data to the microprocessor
signal/data converted to digital/using ADC
microprocessor compares value to a stored value
if input value < stored value …
… signal sent from microprocessor to actuator
… and light is switched on/off
whole process continues in an infinite loop
Avoiding frequent on/off switches: (max 2 marks)
−
−
microprocessor continues to keep light on/off for a pre-determined period
after pre-determined period, sensor output is again sampled
[5]
© Cambridge International Examinations 2015
.
Mark Scheme
155
Cambridge O Level – May/June 2015
Page 9
Syllabus
2210
Paper
12
(b) 1 mark for correct sensor, 1 mark for its matching application
(all THREE applications must be different)
sensor
application
infra-red/motion
automatic doors
burglar alarm systems
temperature
chemical process
central heating/air con system
greenhouse environment
oven
sound/acoustic
burglar alarm systems
leak detection system
disco lighting
moisture/humidity
clothes drier
environmental control (greenhouse, air con)
pressure
burglar alarm system
traffic light control
chemical process
carbon dioxide/
oxygen/gas
pollution monitoring in a river
greenhouse environment (growth control)
confined area (e.g. space craft)
Fish tank/Aquarium
magnetic field
mobile phone
anti-lock braking
CD players
[6]
8
1 mark per correct word
Freeware
Shareware
Free software
(Computer) Ethics
Plagiarism
[5]
© Cambridge International Examinations 2015
.
Mark Scheme
156
Cambridge O Level – May/June 2015
Page 10
9
Syllabus
2210
Paper
12
(a) 1 mark per correctly placed tick
statement
interpreter
compiler
creates an executable file that runs directly on the computer
more likely to crash the computer since the machine code
produced runs directly on the processor
easier to debug since each line of code is analysed and
checked before being executed
slow speed of execution of program loops
it is more difficult to modify the code since the executable
code is now in machine code format
[5]
(b) Any one from:
−
−
code is required to be converted into machine code/binary
code needs to be produced that can be understood by the computer
[1]
(c) Any one from:
−
−
−
close to English/native/human language
easier/faster to correct errors/read/write
works on many different machines/operating systems (portable)
[1]
(d) Any one from:
−
−
−
work directly on registers/CPU
more control over what happens in computer
can use machine specific functions
[1]
(e) 1 mark per correct letter, maximum 2 marks
Assembly code:
B
High-level language code: C
Machine code:
A
[2]
© Cambridge International Examinations 2015
.
Mark Scheme
157
Cambridge O Level – May/June 2015
Page 11
Syllabus
2210
Paper
12
10 (a) 1 mark for two correct lines, 2 marks for four correct lines
L (108):
0
1
1
0
1
1
0
0
I (105):
0
1
1
0
1
0
0
1
G (103):
0
1
1
0
0
1
1
1
N (110):
0
1
1
0
1
1
1
0
[2]
(b) 1 mark for each correct binary value
1 mark for each correct hexadecimal value
hexidecimal
L:
1
1
0
1
1
0
0
0
D8
G:
1
1
0
0
1
1
1
0
CE
[4]
© Cambridge International Examinations 2015
.
158
Cambridge International Examinations
Cambridge Ordinary Level
* 4 3 5 7 9 6 3 4 4 8 *
2210/21
COMPUTER SCIENCE
Paper 2 Problem-solving and Programming
May/June 2015
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
Answer all questions.
DO NOT ATTEMPT TASKS 1, 2 AND 3 in the pre-release material; these are for information only.
You are advised to spend no more than 40 minutes on Section A (Question 1).
No marks will be awarded for using brand names of software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The maximum number of marks is 50.
This document consists of 11 printed pages and 1 blank page.
DC (SLM) 108497
© UCLES 2015
[Turn over
.
2
159
Section A
You are advised to spend no longer than 40 minutes answering this section.
Here is a copy of the pre-release material.
DO NOT attempt Tasks 1, 2 and 3 now.
Use the pre-release material and your experience from attempting the tasks before the examination to
answer Question 1.
Pre-release Material
Write and test a program to complete the three tasks.
TASK 1
A data logger records the temperature on the roof of a school twice a day, at midday and midnight.
Input and store the temperatures recorded for a month. You must store the temperatures in two onedimensional arrays, one for the midday temperatures and one for the midnight temperatures. All the
temperatures must be validated on entry and any invalid temperatures rejected. You must decide
your own validation rules. You may assume that there are 30 days in a month.
TASK 2
Calculate the average temperature for midday and the average temperature for midnight. Output
these averages with a suitable message for each one.
TASK 3
Select the day with the highest midday temperature and the day with the lowest midnight temperature.
Then output each of these temperatures, the corresponding day and a suitable message.
Your program must include appropriate prompts for the entry of data. Error messages and other
outputs need to be set out clearly and understandably. All variables, constants and other identifiers
must have meaningful names. Each task must be fully tested.
© UCLES 2015
2210/21/M/J/15
.
3
160
1
(a) All variables, constants and other identifiers should have meaningful names.
(i)
In Task 1, you had to store the midday temperatures and midnight temperatures in
arrays.
Write suitable declarations for these two arrays.
...........................................................................................................................................
.......................................................................................................................................[2]
(ii)
It has been decided to record the temperatures for one week rather than one month.
Write the new array declarations that you would use.
...........................................................................................................................................
.......................................................................................................................................[1]
(iii)
Declare two other variables that you have used and state what you used each one for.
Variable 1 ...........................................................................................................................
Use .....................................................................................................................................
Variable 2 ...........................................................................................................................
Use .................................................................................................................................[4]
© UCLES 2015
2210/21/M/J/15
[Turn over
.
4
161
(b) Write an algorithm to complete Task 2, using either pseudocode, programming statements
or a flowchart. Use temperatures for one week only. You should assume that Task 1 has
already been completed.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
© UCLES 2015
2210/21/M/J/15
.
5
162
(c) Give a set of midday temperature data, for a week, that could be used to check your validation
rules for Task 1. Explain why you chose this data set.
Data set .....................................................................................................................................
...................................................................................................................................................
Reason for choice ......................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(d) Explain how you select the day with the highest midday temperature (part of Task 3). You may
include pseudocode or programming statements as part of your explanation.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
© UCLES 2015
2210/21/M/J/15
[Turn over
.
6
163
Section B
2
Read this section of program code that should input 10 positive numbers and then output the
smallest number input.
1
Small = 0
2
Counter = 0
3
REPEAT
4
INPUT Num
5
IF Num < Small THEN Num = Small
6
Counter = Counter + 1
7
PRINT Small
8
UNTIL Counter < 10
There are four errors in this code.
Locate these errors and suggest a corrected piece of code for each error.
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
4 .......................................................................................................................................................
......................................................................................................................................................[4]
© UCLES 2015
2210/21/M/J/15
.
7
164
Question 3 begins on page 8.
© UCLES 2015
2210/21/M/J/15
[Turn over
.
8
165
3
The flowchart below inputs the weight of a number of parcels in kilograms. Parcels weighing more
than 25 kilograms are rejected. A value of –1 stops the input.
The following information is output: the total weight of the parcels accepted and number of parcels
rejected.
START
7RWDOĸ
5HMHFWĸ
INPUT
Weight
Is Weight
= –1?
Yes
OUTPUT Total,
Reject
END
No
Is Weight
> 25?
Yes
5HMHFWĸ5HMHFW
No
7RWDOĸ7RWDO:HLJKW
© UCLES 2015
2210/21/M/J/15
.
9
166
Complete the trace table for the input data:
1.8, 26.0, 7.0, 11.3, 10.0, 2.5, 25.2, 5.0, 19.8, 29.3, –1
Total
Reject
Weight
OUTPUT
[5]
4
Five data types and five data samples are shown below.
Draw a line to link each data type to the correct data sample.
Data type
Data sample
Integer
'a'
Real
2
Char
2.0
String
True
Boolean
"Twelve"
[4]
© UCLES 2015
2210/21/M/J/15
[Turn over
.
110
67
5
Explain the difference between a variable and a constant in a program.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[2]
6
Identify three different loop structures that you can use when writing pseudocode.
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
......................................................................................................................................................[3]
7
A database, PROPERTY, was set up to show the prices of properties for sale and the features of
each property. Part of the database is shown below.
Brochure
No
Number of
Bedrooms
Number of
Bathrooms
Garden
Garage
Price
in $
Bungalow
B17
7
4
Yes
Yes
750,000
Apartment
A09
2
1
No
No
100,000
House
H10
4
2
Yes
No
450,000
House
H13
3
2
Yes
No
399,000
Apartment
A01
2
2
No
Yes
95,000
Apartment
A16
1
1
No
No
150,000
House
H23
3
1
No
Yes
250,000
House
H46
2
1
Yes
Yes
175,000
Property Type
(a) Give the number of fields that are in each record.
...............................................................................................................................................[1]
© UCLES 2015
2210/21/M/J/15
.
111
68
(b) State which field you would choose for the primary key.
...................................................................................................................................................
Give a reason for choosing this field.
...................................................................................................................................................
...............................................................................................................................................[2]
(c) State the data type you would choose for each of the following fields.
Garage .....................................................................................................................................
Number of Bedrooms .............................................................................................................
Price in $ ..............................................................................................................................[3]
(d) The query-by-example grid below selects all houses with more than 1 bathroom and more
than 2 bedrooms.
Field: Property Type
Number of
Bedrooms
Number of
Bathrooms
Price in $
Brochure No
Table: PROPERTY
PROPERTY
PROPERTY
PROPERTY
PROPERTY
Sort:
Ascending

Show:
Criteria: = 'House'
>2

>1
or:
Show what would be output.
...................................................................................................................................................
...............................................................................................................................................[2]
(e) Complete the query-by-example grid below to select and show the brochure number, property
type and price of all properties with a garage below $200,000.
Field:
Table:
Sort:
Show:
Criteria:
or:
[4]
© UCLES 2015
2210/21/M/J/15
.
Mark Scheme
169
Cambridge O Level – May/June 2015
Page 2
Syllabus
2210
Paper
21
Section A
1
(a) (i) Many correct answers, they must be meaningful. These are examples only.
– MiddayTemperature[1:30]
or MiddayTemperature[0:29]
or MiddayTemperature[30]
or MiddayTemperature[29]
or MiddayTemperature[]
(1 mark)
– MidnightTemperature[1:30]
or MidnightTemperature[0:29]
or MidnightTemperature[30]
or MidnightTemperature[29]
or MidnightTemperature[]
(1 mark)
(ii) Answers, must match above and the upper bound should have been changed from
30 to 7 or 29 to 6 or no change if not used. These are examples only.
– MiddayTemperature[1:7] MidnightTemperature[1:7]
or MiddayTemperature[7] MidnightTemperature[7]
[2]
[1]
(iii) Any two variables with matching reasons, 1 mark for the variable and 1 mark
for the matching reason. The variables and the matching reasons must relate to
the tasks in the pre-release. There are many possible correct answers these are
examples only.
Variable
– Counter: (Integer)
Reason
– to use as a loop counter when entering the temperature
Variable
Reason
–
–
HighNoon: (Real)
to store the highest midday temperature
© Cambridge International Examinations 2015
[4]
.
Mark Scheme
170
Cambridge O Level – May/June 2015
Page 3
Syllabus
2210
Paper
21
(b) If loop used
– initialisation before loop
– loop
– running total inside loop
– calculation of average outside loop
– output of average with message outside loop
(Max 4 marks)
–
completion of at least 3 of initialisation, running total, calculation of average and
output of average with message for both midday and midnight
(1 mark)
[5]
sample algorithm:
MiddayTotal ← 0; MidnightTotal ← 0
FOR Count ← 1 TO 7
MiddayTotal ← MiddayTotal + MiddayTemperature[Count]
MidnightTotal ← MidnightTotal + MidnightTemperature[Count]
NEXT Count
MiddayAverage ← MiddayTotal/7
MidnightAverage ← MiddayTotal/7
PRINT 'The average midday temperature is ', MiddayAverage
PRINT 'The average midnight temperature is ', MidnightAverage
If loop not used
– total of 7 midday temperatures
– calculation of midday average (Note could be combined as one calculation,
see example below)
– total of 7 midnight temperatures
– calculation of midnight average (Note could be combined as one calculation,
see example below)
– output of both averages with suitable messages
sample algorithm:
MiddayAverage ← (MiddayTemperature[1]+ MiddayTemperature[2]+
MiddayTemperature[3]+ MiddayTemperature[4]+
MiddayTemperature[5]+ MiddayTemperature[6]+
MiddayTemperature[7])/7
MidnightAverage ← (MidnightTemperature[1]+
MidnightTemperature[2]+ MidnightTemperature[3]+ Midnight[4]+
Midnight[5]+ Midnight[6]+ MidnightTemperature[7])/7
PRINT 'The average midday temperature is ', MiddayAverage
PRINT 'The average midnight temperature is ', MidnightAverage
© Cambridge International Examinations 2015
[5]
.
Mark Scheme
171
Cambridge O Level – May/June 2015
Page 4
Syllabus
2210
Paper
21
(c) 1 mark for the data set and 1 mark for the matching reason.
There are many possible correct answers, these are examples only.
Data set
– 30, 29, 28, 31.5, 32.3, 33, 29.7
Reason
– normal data that should be accepted
Data set
Reason
–
–
twenty, 23.99, seventeen, 501, –273, @#@, seventy seven
abnormal data that should be rejected
[2]
(d) Maximum 6 marks in total for question part
Explanation (max 6)
– set variable called HighestMidday to a large minus number
– loop (30 or 7) times to check each midday temperature in turn
– check midday temperature against HighestMidday / midday temperature >
HighestMidday
– …replace value in HighestMidday by midday temperature
– …store array index in MiddayMonthDay/MiddayWeekday
– output HighestMidday outside the loop
– output MiddayMonthDay/MiddayWeekday outside the loop
Sample algorithm (max 4):
HighestMidday ← -999
FOR Count ← 1 TO 7
IF MiddayTemperature [Count] > HighestMidday
THEN HighestMidday ← MiddayTemperature[Count]
MiddayMonthDay/MiddayWeekday ← Count
ENDIF
NEXT Count
PRINT 'The highest midday temperature was ',HighestMidday, ' on
day ', Count
If pseudocode or programming only and no explanation, then maximum 4 marks
© Cambridge International Examinations 2015
[6]
.
Mark Scheme
172
Cambridge O Level – May/June 2015
Page 5
Syllabus
2210
Paper
21
Section B
2
1 mark for each error identified + suggested correction
Line 1 or Small = 0: this should read Small = 999
line 5 or IF…:
this should read IF Num < Small THEN Small = Num
line 8 or UNTIL:
this should read UNTIL Counter = 10 or
UNTIL Counter > = 10 or
UNTIL Counter > 9
line 7 or PRINT…:
PRINT Small should come after the end of the repeat loop
or
line 8 or UNTIL:
this should come before line 7
[4]
3
Total
Reject
0
0
1.8
Weight
1.8
1
26.0
8.8
7.0
20.1
11.3
30.1
10.0
32.6
2.5
2
25.2
37.6
5.0
57.4
19.8
3
(2 marks)
(–1 for each error)
(then follow though)
Output
(1 mark)
29.3
–1
57.4, 3
1 mark)
(1 mark)
(allow follow through)
(from Total and Reject)
[5]
© Cambridge International Examinations 2015
.
Mark Scheme
173
Cambridge O Level – May/June 2015
Page 6
4
Syllabus
2210
Paper
21
1 mark for each correct link, up to maximum of 4 marks
Integer
'a'
Real
2
Char
2.0
String
True
Boolean
'Twelve'
[4]
5
6
7
Any two points from
– a variable is used to store data that can change during the running of a program
– a constant is used to store data that will not be changed during the running of a
program
[2]
–
–
–
[3]
FOR (… TO … NEXT)
REPEAT (… UNTIL)
WHILE (… DO … ENDWHILE)
(a) –
7
[1]
(b) –
–
Brochure No
Uniquely identifies each property
[2]
(c) Garage
Number of Bedrooms
Price in $
(d) 399000
450000
–
–
–
Boolean
Number/Integer/Single
Number/Single/Real/Currency
H13
H10
[3]
[2]
© Cambridge International Examinations 2015
.
Mark Scheme
174
Cambridge O Level – May/June 2015
Page 7
(e)
Syllabus
2210
Field:
Property Type
Garage
Price in $
Brochure No
Table:
PROPERTY
PROPERTY
PROPERTY
PROPERTY
True
< 200000
Paper
21
Sort:
Show:
Criteria:
or:
or
Field:
Property Type
Garage
Price in $
Brochure No
Table:
PROPERTY
PROPERTY
PROPERTY
PROPERTY
Yes
< 200000
Sort:
Show:
Criteria:
or:
or
Field:
Property Type
Garage
Price in $
Brochure No
Table:
PROPERTY
PROPERTY
PROPERTY
PROPERTY
=Yes
< 200000
Sort:
Show:
Criteria:
or:
or
Field:
Property Type
Garage
Price in $
Brochure No
Table:
PROPERTY
PROPERTY
PROPERTY
PROPERTY
=-1
< 200000
(1 mark)
(1 mark)
Sort:
Show:
Criteria:
or:
(1 mark)
(1 mark)
[4]
© Cambridge International Examinations 2015
.
175
Cambridge International Examinations
Cambridge Ordinary Level
* 7 0 6 5 7 0 5 1 2 4 *
2210/22
COMPUTER SCIENCE
Paper 2 Problem-solving and Programming
May/June 2015
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
Answer all questions.
DO NOT ATTEMPT TASKS 1, 2 AND 3 in the pre-release material; these are for information only.
You are advised to spend no more than 40 minutes on Section A (Question 1).
No marks will be awarded for using brand names of software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The maximum number of marks is 50.
This document consists of 11 printed pages and 1 blank page.
DC (FD) 110074
© UCLES 2015
[Turn over
.
2
176
Section A
You are advised to spend no longer than 40 minutes answering this section.
Here is a copy of the pre-release material.
DO NOT attempt Tasks 1, 2 and 3 now.
Use the pre-release material and your experience from attempting the tasks before the examination to
answer Question 1.
Pre-release Material
Write and test a program to complete the three tasks.
TASK 1
A school keeps records of the weights of each pupil. The weight, in kilograms, of each pupil is
recorded on the first day of term. Input and store the weights and names recorded for a class of
30 pupils. You must store the weights in a one-dimensional array and the names in another onedimensional array. All the weights must be validated on entry and any invalid weights rejected. You
must decide your own validation rules. You may assume that the pupils’ names are unique. Output
the names and weights of the pupils in the class.
TASK 2
The weight, in kilograms, of each pupil is recorded again on the last day of term. Calculate and store
the difference in weight for each pupil.
TASK 3
For those pupils who have a difference in weight of more than 2.5 kilograms, output, with a suitable
message, the pupil’s name, the difference in weight and whether this is a rise or a fall.
Your program must include appropriate prompts for the entry of data. Error messages and other
outputs need to be set out clearly and understandably. All variables, constants and other identifiers
must have meaningful names. Each task must be fully tested.
© UCLES 2015
2210/22/M/J/15
.
3
177
1
(a) All variables, constants and other identifiers should have meaningful names.
(i)
Declare the array to store the pupils’ names.
.......................................................................................................................................[1]
(ii)
Declare the array to store the pupils’ weights.
.......................................................................................................................................[1]
(iii)
It has been decided to record the weights for the whole school of 600 pupils rather than
one class.
Write suitable new declarations for these two arrays.
...........................................................................................................................................
.......................................................................................................................................[1]
(b) Write an algorithm to complete Task 2, using either pseudocode, programming statements
or a flowchart. Use weights for the whole school. You should assume that Task 1 has already
been completed.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
© UCLES 2015
2210/22/M/J/15
[Turn over
.
4
178
(c) (i)
Describe suitable validation rules for Task 1.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(ii)
Give two pupil weights that you could use to check the validation used in Task 1. Explain
why you chose each weight.
Weight 1 ............................................................................................................................
Reason for choice .............................................................................................................
...........................................................................................................................................
Weight 2 ............................................................................................................................
Reason for choice .............................................................................................................
.......................................................................................................................................[4]
(d) Explain how you select the pupils with a fall in weight of more than 2.5 kilograms (part of
Task 3). You may include pseudocode or programming statements as part of your explanation.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
© UCLES 2015
2210/22/M/J/15
.
5
179
Section B
2
Read this section of program code that should input 30 positive numbers and then output the
largest number input.
1
Large = 9999
2
Counter = 0
3
WHILE Counter > 30
4
DO
5
INPUT Num
6
IF Num < Large THEN Large = Num
7
Counter = Counter - 1
8
ENDWHILE
9
PRINT Large
There are four errors in this code.
Locate these errors and suggest a corrected piece of code for each error.
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
4 .......................................................................................................................................................
......................................................................................................................................................[4]
© UCLES 2015
2210/22/M/J/15
[Turn over
.
6
180
3
(a) The flowchart below inputs six single digit numbers. The predefined function MOD gives the
value of the remainder, for example, Y ← 10 MOD 3 gives the value Y = 1
START
INPUT
A, B, C, D, E, F
Total @ A*1 + B*2 + C*3 + D*4 + E*5
Check @ Total MOD 11
Is Check = Yes
F?
No
OUTPUT
'Reject'
END
© UCLES 2015
2210/22/M/J/15
OUTPUT
'Accept'
.
7
181
Complete a trace table for each of the two sets of input data.
Set 1
5, 2, 4, 3, 1, 5
Set 2
3, 2, 1, 0, 7, 3
Trace table set 1 5, 2, 4, 3, 1, 5
A
B
C
D
E
F
Total
Check
Output
D
E
F
Total
Check
Output
Trace table set 2 3, 2, 1, 0, 7, 3
A
B
C
[4]
(b) State the purpose of the flowchart in part (a).
...................................................................................................................................................
...............................................................................................................................................[1]
(c) Identify a problem with this flowchart and explain how to correct it.
Problem ....................................................................................................................................
...................................................................................................................................................
Solution .....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
© UCLES 2015
2210/22/M/J/15
[Turn over
.
8
182
4
Four programming concepts and four examples of programming code are shown below.
Draw a line to link each programming concept to the correct example of programming code.
Programming
concept
Example of programming code
Counting
Sum = Sum + Value[n]
Repetition
IF Value = 10 THEN PRINT 'X'
Selection
FOR Counter = 1 TO 10
Totalling
Amount = Amount + 1
Sum = Num1 + Num2
[4]
5
(a) Write an algorithm, using pseudocode and a FOR … TO … NEXT loop structure, to input
1000 numbers into an array.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) Rewrite your algorithm using another loop structure.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
© UCLES 2015
2210/22/M/J/15
.
9
183
Question 6 begins on page 10.
© UCLES 2015
2210/22/M/J/15
[Turn over
.
110
84
6
A database, MARKS, was set up to record the test results for a class of students. Part of the
database is shown below.
Student Name
Class ID
Maths
English
Science
History
Geography
Paul Smith
0017
70
55
65
62
59
Ravi Gupta
0009
29
34
38
41
44
Chin Hwee
0010
43
47
50
45
52
John Jones
0013
37
67
21
28
35
Diana Abur
0001
92
88
95
89
78
Rosanna King
0016
21
13
11
27
15
(a) Give the number of fields that are in each record.
...............................................................................................................................................[1]
(b) State which field you would choose for the primary key.
...................................................................................................................................................
Give a reason for choosing this field.
...................................................................................................................................................
...............................................................................................................................................[2]
(c) The query-by-example grid below selects all students with more than 60 marks in History or
more than 60 marks in Geography.
Field:
Student Name
History
Geography
Table:
MARKS
MARKS
MARKS
Sort:
Show:
Ascending
✓
Criteria:
>60
or:
>60
Show what would be output.
...................................................................................................................................................
...............................................................................................................................................[2]
© UCLES 2015
2210/22/M/J/15
.
111
85
(d) Complete the query-by-example grid below to select and show the student names only of all
students with less than 40 marks in both Maths and English.
Field:
Table:
Sort:
Show:
Criteria:
or:
[3]
© UCLES 2015
2210/22/M/J/15
Page 2
.
Mark Scheme
186
Cambridge O Level – May/June 2015
Syllabus
2210
Paper
22
Section A
1
(a) (i) Many correct answers, they must be meaningful. This is an example only.
– PupilName[1:30]
or PupilName[0:29]
or PupilName[30]
or PupilName[29]
or PupilName[]
[1]
(ii) Many correct answers, they must be meaningful. This is an example only.
– StartWeight[1:30]
or StartWeight[0:29]
or StartWeight[30]
or StartWeight[29]
or StartWeight[]
[1]
(iii) Answers, must match (i) and (ii) above and the upper bound should have been changed
from 30 to 600 or 29 to 599 or no change if not used.
– StartWeight[1:600] or StartWeight[600]
– PupilName[1:600] or PupilName[600]
[1]
(b) any four from
– prompt for entry of final weight that includes pupil’s name
– input final weight
– validation check for final weight
– calculation of difference in weight
– ……using the initial weight stored in the array
– store difference in weight
(Max 4 marks)
– loop for 600 pupils
(1 mark)
sample algorithm:
FOR Count 1 TO 600
REPEAT
PRINT 'Please enter weight for ', PupilName[Count]
INPUT FinalWeight
UNTIL FinalWeight < 120 AND FinalWeight > 20
WeightDifference[Count] FinalWeight - StartWeight[Count]
NEXT Count
© Cambridge International Examinations 2015
[5]
.
Mark Scheme
187
Cambridge O Level – May/June 2015
Page 3
Syllabus
2210
Paper
22
(c) (i) any two from
– check that the weights are within a given range
– check that the weights are numeric
– check that the weights are given to one decimal point
– character/type check on name
– length check on name
[2]
(ii) 1 mark for the data and 1 mark for the matching reason.
There are many possible correct answers this is an example only.
Weight 1
– 35.2
Reason
– normal data that should be accepted
Weight 2
Reason
– twenty
– abnormal data that should be rejected
[4]
(d) Maximum 6 marks in total for question part
Explanation (max 6)
– loop 30 or 600 times to check each difference in weight
– check for a difference in weight
– less than -2.5 (final weight – start weight) or greater than 2.5 (start weight – final weight)
– …If so output pupil’s name
– …if so output difference in weight
– …if so output message that it is a fall in weight
Sample algorithm (max 4)
FOR Count 1 TO 30
IF WeightDifference [Count] < -2.5
THEN PRINT PupilName[Count], 'The weight loss was ',
WeightDifference [Count]
ENDIF
NEXT Count
If pseudocode or programming only and no explanation, then maximum 4 marks
© Cambridge International Examinations 2015
[6]
.
Mark Scheme
188
Cambridge O Level – May/June 2015
Page 4
Syllabus
2210
Paper
22
Section B
2
3
1 mark for each error identified + suggested correction
Line 1 or Large =9999:
this should read Large = 0
Line 3 or WHILE:
this should read WHILE Counter < 30
line 6 or IF:
this should read IF Num > Large THEN Large = Num
line 7 or Counter =…: this should read Counter = Counter + 1
[4]
(a)
Trace table set 1
A
B
C
D
E
F
Total
Check
Output
5
2
4
3
1
5
38
5
Accept
-----------------------------------(1 mark)-----------------------------------(1 mark)------
Trace table set 2
A
B
C
D
E
F
Total
Check
Output
3
2
1
0
7
3
45
1
Reject
-----------------------------------(1 mark)-----------------------------------(1 mark)------
[4]
(b) – (modulo 11) check digit calculation
[1]
(c) 1 mark for identifying the problem, 2 marks for the solution
Problem
– doesn’t deal correctly with remainder 10/a check digit of X
Solution
– check Z for X as a final digit
– have a special case where check = 10
– accept where Check = 10 and F = X
[3]
© Cambridge International Examinations 2015
.
Mark Scheme
189
Cambridge O Level – May/June 2015
Page 5
4
Syllabus
2210
Paper
22
1 mark for each correct line, two lines from one box not allowed
Counting
Sum = Sum + Value[n]
Repetition
IF Value = 10 THEN PRINT
'X'
Selection
FOR Counter = 1 TO 10
Amount = Amount + 1
Totalling
Sum = Num1 + Num2
[4]
5
(a) 1 mark for FOR … TO … NEXT 1 mark for INPUT
FOR Count 1 TO 1000
INPUT A[Count]
NEXT (Count)
[2]
(b) 4 marks
– initialisation
– start of loop
– update loop counter
– end of loop
Example1
Count 1
REPEAT
INPUT A[Count]
Count Count + 1
UNTIL Count > 1000
Example2
Count 0
WHILE Count < 1000
DO
Count Count + 1
INPUT A[Count]
ENDWHILE
(1 mark)
(1 mark)
(1 mark)
(1 mark)
(1 mark)
(1 mark)
(1 mark)
(1 mark)
[4]
© Cambridge International Examinations 2015
.
Mark Scheme
190
Cambridge O Level – May/June 2015
Page 6
6
(a) – 7
Syllabus
2210
Paper
22
[1]
(b) – Class ID
– Uniquely identifies each student
[2]
(c) Diana Abur, Paul Smith
– both names
– ……. correct order
[2]
(d)
Field: Student Name
Table: MARKS
Maths
English
MARKS
MARKS
Sort:
Show:
Criteria:
<40
<40
or:
(1 mark)
(1 mark)
© Cambridge International Examinations 2015
(1 mark)
[3]
.
191
Cambridge International Examinations
Cambridge Ordinary Level
*8805434291*
2210/12
COMPUTER SCIENCE
Paper 1 Theory
October/November 2015
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
Answer all questions.
No marks will be awarded for using brand names of software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The maximum number of marks is 75.
This document consists of 12 printed pages.
© UCLES 2015
[Turn over
.
2
192
1
There are a number of security risks associated with using the Internet.
Name three of these risks. For each, state why it is a risk and describe how the risk can be
minimised.
Security risk 1 ...................................................................................................................................
Why it is a risk ..................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
How to minimise the risk ..................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Security risk 2 ...................................................................................................................................
Why it is a risk ...................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
How to minimise the risk ..................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Security risk 3 ...................................................................................................................................
Why it is a risk ..................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
How to minimise the risk ..................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[9]
© UCLES 2015
2210/12/O/N/15
.
3
193
2
Seven computer terms and seven descriptions are shown below.
Draw a line to link each computer term to its most appropriate description.
Computer term
Description
Interface
Reduction of file size by permanently removing
some redundant information from the file
Interrupt
File compression format designed to make
photo files smaller in size for storage and for
transmission
JPEG
File compression system for music which does
not noticeably affect the quality of the sound
Lossless
compression
Hardware component that allows the user to
communicate with a computer or operating
system
Lossy
compression
The file is reduced in size for transmission and
storage; it is then put back together again later
producing a file identical to the original
MIDI
MP3 format
Signal sent to a processor which may cause
a break in execution of the current routine,
according to priorities
Standard adopted by the electronic music
industry for controlling devices such as
synthesisers and sound cards
[6]
© UCLES 2015
2210/12/O/N/15
[Turn over
.
4
194
3
The flowchart on the opposite page shows what happens when the barcode on a product is
scanned at the checkout in a supermarket. The barcodes are used in an automatic stock control
system.
Several of the statements in the flowchart are missing.
Using item number only from the list below, complete the flowchart.
Item
number
© UCLES 2015
Statement
1
Add flag to product record to indicate re-order made
2
Any more barcodes to scan?
3
Has the scanned barcode been found in the file?
4
Has the re-order flag already been added to the product record?
5
Is number of product in stock <= re-order level?
6
Number of product in stock is reduced by 1
7
Output an error message
8
Automatically send out order for new product
2210/12/O/N/15
.
5
195
START
Barcode on product
is scanned
END
No
Yes
Barcode is looked up
in stock database
No
Yes
Yes
Any more
barcodes
to scan?
No
No
Yes
Yes
END
No
[4]
© UCLES 2015
2210/12/O/N/15
[Turn over
.
6
196
4
(a) (i)
Convert the following two hexadecimal numbers into binary:
FA7
D3E
FA7
D3E
[4]
(ii)
Now perform the AND (logic) operation on each corresponding pair of binary bits in the
two numbers from part (i).
[2]
(iii)
Convert your answer in part (ii) into hexadecimal.
...........................................................................................................................................
...........................................................................................................................................
[2]
© UCLES 2015
2210/12/O/N/15
.
7
197
(b) (i)
The following code shows HTML ‘tag’ pairs on either side of the text stating the colour
that each creates.
<font color “ # F F 0 0 0 0 “ > RED </font>
<font color “ # 0 0 F F 0 0 “ > GREEN </font>
<font color “ # 0 0 0 0 F F “ > BLUE </font>
<font color “ #
<font color “ #
<font color “ #
X
Y
Z
“ > YELLOW </font>
“ > MAGENTA </font>
“ > CYAN </font>
Yellow is a combination of red and green, magenta a combination of red and blue and
cyan a combination of green and blue.
State what 6-digit hexadecimal values should replace X, Y and Z in the above code.
X ........................................................................................................................................
Y ........................................................................................................................................
Z ........................................................................................................................................
[3]
(ii)
Describe how other colours, such as a darker shade of blue, are created.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
(c) 1A – 16 – C5 – 22 – FF – FF is an example of a MAC address.
(i)
Identify what the first six and last six hexadecimal digits represent.
First six digits ....................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Last six digits .....................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
(ii)
State why MAC addresses are used.
...........................................................................................................................................
...........................................................................................................................................
[1]
© UCLES 2015
2210/12/O/N/15
[Turn over
.
8
198
5
A security system uses sensors, a camera and a microprocessor to capture images of each person
entering a large shopping mall.
(a) Describe how the sensors, camera and microprocessor interact to identify certain people
entering the mall.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[5]
(b) Each image taken requires 1 MB of storage. If the camera captures an image every 5 seconds
over a 24 hour period, how much storage is required?
Give your answer in gigabytes and show all your working.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
(c) The shopping mall has over 100 cameras. At the end of each day all these cameras send
their images, captured over the last 24 hours, to a central computer.
Explain why the mall uses dedicated fibre optic cable rather than transmitting the data over
the local broadband network.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
© UCLES 2015
2210/12/O/N/15
.
9
199
6
(a) Explain what is meant by HTML.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
(b) HTML uses both structure and presentation.
Describe what is meant by the two terms.
Structure ....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Presentation ..............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
(c) Explain the function of a web browser.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
© UCLES 2015
2210/12/O/N/15
[Turn over
.
210
00
7
(a) Check digits are used to ensure the accuracy of input data.
A 7-digit code number has an extra digit on the right, called the check digit.
Digit position
1
2
3
4
5
6
7
8
Digit
–
–
–
–
–
–
–
–
The check digit is calculated as follows:
•
each digit in the number is multiplied by its digit position
•
the seven results are then added together
•
this total is divided by 11
•
the remainder gives the check digit (if the remainder = 10, the check digit is X)
(i)
Calculate the check digit for the following code number. Show all your working.
4
2
4
1
5
0
8
…
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Check digit ........................................................................................................................
[2]
(ii)
An operator has just keyed in the following code number:
3
2
4
0
0
4
5
X
Has the operator correctly keyed in the code number?
...........................................................................................................................................
Give a reason for your answer.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
© UCLES 2015
2210/12/O/N/15
.
211
01
(b) When data are transmitted from one device to another, a parity check is often carried out on
each byte of data. The parity bit is often the leftmost bit in the byte.
(i)
If a system uses even parity, give the parity bit for each of the following bytes:
parity bit
1
1
0
0
1
1
0
0
0
0
0
0
0
1
parity bit
[2]
(ii)
A parity check can often detect corruption of a byte.
Describe a situation in which it cannot detect corruption of a byte.
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[1]
8
The steps to print a document using a laser printer are shown in the table below.
Put each step in the correct order. The first step has been done for you.
Step
Order
As the printing drum rotates, a laser scans across it; this removes the
positive charge in certain areas
The printing drum is coated in positively-charged toner; this then sticks to the
negatively-charged parts of the printing drum
The paper goes through a fuser which melts the toner so it fixes permanently
to the paper
The printer driver ensures that the data is in a format that the laser printer
can understand
1
A negatively-charged sheet of paper is then rolled over the printing drum
Data is then sent to the laser printer and stored temporarily in the printer
buffer
The toner on the printing drum is now transferred to the paper to reproduce
the required text and images
The printing drum is given a positive charge
Negatively-charged areas are then produced on the printing drum; these
match exactly with the text and images to be printed
[8]
© UCLES 2015
2210/12/O/N/15
[Turn over
.
212
02
9
A remote-controlled model car contains RAM, ROM and a solid state drive. The car receives
radio signals from its remote control. It can only receive radio signals of a certain frequency. The
manufacturer sets this frequency and the owner cannot change it. The owner of the model car can
input their own sequence of movements from an interface underneath the car.
(a) Describe the purpose of each of the three types of memory supplied with the car.
RAM ..........................................................................................................................................
...................................................................................................................................................
ROM .........................................................................................................................................
...................................................................................................................................................
Solid state drive ........................................................................................................................
...................................................................................................................................................
[3]
(b) The owner needs to be able to enter their own sequence of movements for the model car.
Name a suitable input device.
Input device ..............................................................................................................................
...................................................................................................................................................
Give a reason for your choice of device.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
(c) Explain why the model car uses a solid state drive rather than another type of secondary
storage.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
© UCLES 2015
2210/12/O/N/15
Page 2
1
.
Mark Scheme
203
Cambridge O Level – October/November 2015
Syllabus
2210
Paper
12
1 mark for each risk + 1 mark for corresponding reason why it is a risk and 1 mark for method
of minimisation
Risk:
Reason:
Minimised:
Risk:
Reason:
Minimised:
hacking
illegal/unauthorised access to data
deletion/amendment of data
use of passwords/user ids
use of firewalls
encrypt data/encryption
virus
can corrupt/delete data
cause computer to crash/run slow
can fill up hard drive with data
use of /run anti-virus (software)
do not download software or data from unknown sources
Risk:
Reason:
Minimised:
spyware/key logging (software)
can read key presses/files/monitors on a user’s computer
use of/run anti-spyware (software)
use data entry methods such as drop-down boxes to minimise risk
Risk:
Reason:
phishing
link/attachments takes user to fake/bogus website
website obtains personal/financial data
do not open/click emails/attachments from unknown sources
some firewalls can detect fake/bogus websites
Minimised:
Risk:
Reason:
Minimised:
pharming
redirects user to fake/bogus website
redirection obtains personal/financial data
only trust secure websites, e.g. look for https
check the URL matches the intended site
Risk:
Reason:
Minimised:
credit card fraud/identity theft
loss of money due to misuse of card/stealing data
set passwords
encrypt data/encryption
Risk:
Reason:
Minimised:
cracking
illegal/unauthorised access to data
setting strong passwords
encrypt data/encryption
There may be other valid answers given that are outside the provided mark scheme.
[9]
© Cambridge International Examinations 2015
.
Mark Scheme
204
Cambridge O Level – October/November 2015
Page 3
2
Interface
Interrupt
JPEG
Lossless
compression
Lossy
compression
MIDI
MP3 format
Syllabus
2210
Paper
12
Reduction of file size by permanently
removing certain, redundant information
from the file
File compression format designed to make
photo files smaller in size for storage and
for transmission
File compression system for music which
does not noticeably affect the quality of the
sound
Hardware component that allows the user
to communicate with a computer or
operating system
The file is reduced in size for transmission
and storage; it is then put back together
again later producing a file identical to the
original
Signal sent to a processor which may cause
a break in execution of the current routine,
according to priorities
Standard adopted by the electronic music
industry for controlling devices such as
synthesisers and sound cards
[6]
© Cambridge International Examinations 2015
.
Mark Scheme
205
Cambridge O Level – October/November 2015
Page 4
3
START
Syllabus
2210
Paper
12
[4]
barcode on product is
scanned
END
No
barcode is looked up
in stock database
Yes
2
1 mark
No
3
7
Yes
1 mark
6
Yes
No
5
1 mark
any more
barcodes
to scan?
No
Yes
Yes
4
END
No
1/8
1 mark
8/1
[4]
© Cambridge International Examinations 2015
.
Mark Scheme
206
Cambridge O Level – October/November 2015
Page 5
4
(a)
Syllabus
2210
Paper
12
(i) For each hex number, 2 marks if all correct, 1 mark for 2 correct conversions
F A 7:
1
1
1
1
1
0
1
0
0
1
1
1
D 3 E:
1
1
0
1
0
0
1
1
1
1
1
0
[4]
(ii) 2 marks if all correct, 1 mark for 2 correct conversions – Follow through
1
1
0
1
0
0
1
0
0
1
1
0
[2]
(iii) 2 marks if all correct, 1 mark for 2 correct conversions – Follow through
D26
(b) (i) (X)
FF FF 00
(Y)
FF 00 FF
(Z)
00 FF FF
(ii) –
–
[3]
hex values between 0 to F are combined together to create a hex code
different combinations in hex codes will create different shades/tones/colours
(c) (i) First six digits:
Last six digits:
[2]
[2]
manufacturer code/manufacturer ID
serial number/serial ID of device/product
(ii) Allows all devices to be uniquely identified
© Cambridge International Examinations 2015
[2]
[1]
Page 6
5
.
Mark Scheme
207
Cambridge O Level – October/November 2015
Syllabus
2210
Paper
12
(a) Any five from:
– naming a suitable sensor, e.g infra-red, pressure, motion sensors, send signal/data to
microprocessor
– signal/data is converted to digital (using an ADC)
– microprocessor instructs/send signals to camera to capture image/video
– captured image/video data sent to microprocessor
either
– microprocessor compares the image/video with stored images/video…
– … if person detected = stored image …
– …alert given to signal a person has been identified
or
– microprocessor compares the biometric data from an image/video with stored biometric
data for images/video …
– … if biometric data matched = stored data …
– … alert given to signal a person has been identified
– Continual/repeated process
[5]
(b) 1 mark for correct calculation, 1 mark for correct answer
– number of photos = 12 × 60 × 24 = 17 280
– memory requirement = 17 280/1024 = 16.9 (16.875)
– (17 280/1000 = 17.28/17.3 is acceptable)
[2]
(c) Any two from:
– (data transmission) is faster
– more secure/safer (because it is a dedicated line)
– (fibre optic transmission) is more reliable
[2]
© Cambridge International Examinations 2015
Page 7
6
.
Mark Scheme
208
Cambridge O Level – October/November 2015
Syllabus
2210
(a) Any three from:
– hypertext mark-up language
– used to create/develop/author webpages
– translated by a browser to display webpages
– uses (opening and closing) tags to display/format content
Paper
12
[3]
(b) Structure:
– instructs how the layout of the content is displayed
7
Presentation:
– instructs how the content will be formatted e.g. colour/style/CSS
[2]
(c) Any three from:
– displays web page
– interprets/translates the HTML document
– interprets/translates embedded scripting, for example JavaScript
– provides functions, such as bookmarks and history
– identifies protocols, such as https, SSL
[3]
(a) (i) 1 mark for correct check digit and 1 mark for showing the calculation
(4 × 1) + (2 × 2) + (4 × 3) + (1 × 4) + (5 × 5) + (0 × 6) + (8 × 7)
= 4 + 4 + 12 + 4 + 25 + 0 + 56 = 105
105/11 = 9 remainder 6
check digit is: 6
[2]
(ii) 1 mark
– No/incorrect check digit
2 marks
– Total is 78
– 78/11 …
– … gives 7 remainder 1
– check digit should be 1
© Cambridge International Examinations 2015
[3]
.
Mark Scheme
209
Cambridge O Level – October/November 2015
Page 8
(b) (i) 1 mark for each correct parity bit
Syllabus
2210
Paper
12
parity bit
0
1
1
0
0
1
1
0
0
0
0
0
0
0
1
parity bit
1
[2]
(ii) Any one from:
– an even number of digits are changed
– a transposition error(s) has occurred
8
[1]
1 mark for each step in correct order. (NOTE: Marks can be awarded for a correct sequence.)
Steps in the printing process
Step order
As the printing drum rotates, a laser scans across it; this removes the
positive charge in certain areas
4
The printing drum is coated in positively-charged toner; this then sticks to
the negatively-charged parts of the printing drum
6
The paper goes through a fuser which melts the toner so it fixes
permanently to the paper
9
The printer driver ensures that the data is in a format that the laser printer
can understand
(1)
A negatively-charged sheet of paper is then rolled over the printing drum
7
Data is then sent to the laser printer and stored temporarily in the printer
buffer
2
The toner on the printing drum is now transferred to the paper to
reproduce the required text and images
8
The printing drum is given a positive charge
3
Negatively-charged areas are then produced on the printing drum; these
match exactly with the text and images to be printed
5
[8]
© Cambridge International Examinations 2015
Page 9
9
.
Mark Scheme
210
Cambridge O Level – October/November 2015
Syllabus
2210
Paper
12
(a) RAM
– contains instructions/program/data currently in use
ROM
any one from:
– contains the start-up/bootstrap program
– contains/stores the setting for frequency (can’t be changed)
Solid state drive
– stores the instructions/program/data (to operate the car)
[3]
(b) 1 mark for device and 1 mark for corresponding reason
Device:
– touch screen
– key pad (NOT keyboard)
Reason:
– easy to use interface
– limited number of options
– small space/space is limited
– other devices such as mouse, keyboard, trackerball, … not suitable
(c) Any two from:
– A solid state drive has no moving parts
– A solid state drive has faster random access
– A solid state drive has a quick start up/shut down time (reduced latency)
– A solid state drive is very small
– A solid state drive is very light
– A solid state drive consumes very little power
– A solid state drive does not generate a lot of heat (therefore safer in this application)
© Cambridge International Examinations 2015
[2]
[2]
.
211
Cambridge International Examinations
Cambridge Ordinary Level
* 7 0 6 3 0 8 3 5 0 6 *
2210/22
COMPUTER SCIENCE
Paper 2 Problem-solving and Programming
October/November 2015
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
Answer all questions.
DO NOT ATTEMPT TASKS 1, 2 AND 3 in the pre-release material; these are for information only.
You are advised to spend no more than 40 minutes on Section A (Question 1).
No marks will be awarded for using brand names of software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The maximum number of marks is 50.
This document consists of 11 printed pages and 1 blank page.
DC (LK/CGW) 113106
© UCLES 2015
[Turn over
.
2
212
Section A
You are advised to spend no longer than 40 minutes answering this section.
Here is a copy of the pre-release material.
DO NOT attempt Tasks 1, 2 and 3 now.
Use the pre-release material and your experience from attempting the tasks before the examination to
answer Question 1.
Pre-release Material
Write and test a program to complete the three tasks.
A new born baby is kept in a cot in a hospital; the temperature of the baby is monitored every
10 minutes. The temperature of the baby is recorded in degrees Celsius to one decimal place and
must be within the range 36.0°C to 37.5°C.
TASK 1
To simulate the monitoring required, write a routine that allows entry of the baby’s temperature in
degrees Celsius. The routine should check whether the temperature is within the acceptable range,
too high or too low and output a suitable message in each case.
TASK 2
Write another routine that stores the temperatures taken over a three hour period in an array. This
routine should output the highest and lowest temperatures and calculate the difference between
these temperatures.
TASK 3
For a baby who has a temperature difference of more than one degree Celsius, and/or has been
outside the acceptable range more than twice in the three hour period, output a suitable message
giving a summary of the problem.
Your program must include appropriate prompts for the entry of data. Error messages and other
outputs need to be set out clearly and understandably. All variables, constants and other identifiers
must have meaningful names. Each task must be fully tested.
© UCLES 2015
2210/22/O/N/15
.
3
213
1
(a) All variables, constants and other identifiers should have meaningful names.
(i)
When you performed the tasks, you used variables.
Write suitable declarations for two of these.
State what you used each one for.
Variable 1 ..........................................................................................................................
Use ....................................................................................................................................
Variable 2 ..........................................................................................................................
Use ................................................................................................................................[4]
(ii)
When you performed the tasks, you may have used constants.
Write suitable declarations for two of these.
State what you used each one for.
Constant 1 .........................................................................................................................
Use ....................................................................................................................................
...........................................................................................................................................
Constant 2 .........................................................................................................................
Use ....................................................................................................................................
.......................................................................................................................................[4]
© UCLES 2015
2210/22/O/N/15
[Turn over
.
4
214
(b) Write an algorithm to complete Task 1, using either pseudocode, programming statements
or a flowchart.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
© UCLES 2015
2210/22/O/N/15
.
5
215
(c) (i)
Explain how you completed Task 3. You can include pseudocode or programming
statements as part of your explanation. You should assume that Task 2 has been
completed.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[5]
(ii)
Comment on the efficiency of your design for Task 3.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
© UCLES 2015
2210/22/O/N/15
[Turn over
.
6
216
Section B
2
Read this section of program code that should input 50 numbers and then output the average.
1
Total = 0
2
For Counter = 1 TO 50
3
INPUT Num
4
Total = Total + 1
5
Counter = Counter + 1
6
Average = Total/Counter
7
NEXT Counter
8
PRINT Average
There are four errors in this code.
Locate these errors and suggest code corrections to remove each error.
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
4 .......................................................................................................................................................
......................................................................................................................................................[4]
© UCLES 2015
2210/22/O/N/15
.
7
217
Question 3 begins on page 8.
© UCLES 2015
2210/22/O/N/15
[Turn over
.
8
218
3
(a) The flowchart inputs an integer. The predefined function DIV gives the integer result of the
10 DIV 3 gives the value Y = 3. The predefined function MOD gives the
division, e.g. Y
10 MOD 3 gives the value Y = 1.
value of the remainder, e.g. Y
START
Posn @ 1
New @ 0
INPUT X
T1 @ X DIV 2
T2 @ X MOD 2
New @New+T2 * Posn
Posn @Posn * 10
X @T1
Yes
is T1
>= 2?
No
New @New+T1 * Posn
OUTPUT New
END
© UCLES 2015
2210/22/O/N/15
.
9
219
Complete a trace table for each of the two input values 5 and 12.
Trace table for input value 5
X
Posn
New
T1
T2
OUTPUT
T1
T2
OUTPUT
Trace table for input value 12
X
Posn
New
[6]
(b) State the purpose of the flowchart in part (a).
...............................................................................................................................................[1]
© UCLES 2015
2210/22/O/N/15
[Turn over
.
210
20
4
A routine checks the weight of melons to be sold in a supermarket. Melons weighing under
0.5 kilograms are rejected and melons weighing over 2 kilograms are also rejected.
Give an example of each type of test data for this routine.
Normal .............................................................................................................................................
Extreme ............................................................................................................................................
Abnormal ......................................................................................................................................[3]
5
Identify two different conditional statements that you can use when writing pseudocode.
1 .......................................................................................................................................................
2 ...................................................................................................................................................[2]
6
A picture gallery owner has decided to set up a database to keep information about the pictures
he has for sale. The database table, PICTURE, will contain the following fields:
Title; Artist; Description; Catalogue Number; Size (area in square centimetres); Price; Arrived (date
picture arrived at gallery); Sold (whether picture is already sold)
(a) (i)
State what data type you would choose for each field.
Title ...................................................................................................................................
Artist ..................................................................................................................................
Description ........................................................................................................................
Catalogue Number ............................................................................................................
Size ...................................................................................................................................
Price ..................................................................................................................................
Arrived ...............................................................................................................................
Sold ...............................................................................................................................[4]
(ii)
State which field you would choose for the primary key.
.......................................................................................................................................[1]
© UCLES 2015
2210/22/O/N/15
.
211
21
(b) Give a validation check that you can perform on each of these fields. Each validation check
must be different.
Catalogue Number ....................................................................................................................
Size ...........................................................................................................................................
Price .........................................................................................................................................
Arrived ..................................................................................................................................[4]
(c) Complete the query-by-example grid below to select and show the Catalogue Number, Title
and Price of all unsold pictures by the artist ‘Twister’.
Field:
Table:
Sort:
Show:
Criteria:
or:
[5]
© UCLES 2015
2210/22/O/N/15
Page 2
.
Mark Scheme
222
Cambridge O Level – October/November 2015
Syllabus
2210
Paper
22
Section A
1
(a) (i) Any two variables with matching uses, one mark for the variable name and one mark for
the matching use. The variables and the matching uses must relate to the tasks on the
exam paper. There are many possible correct answers these are examples only.
Variable 1 – Counter(: INTEGER)
Use
– to use as a loop counter when entering the temperatures
Variable 2 – BabyTemperature(: REAL)
Use
– to store the baby’s temperature
[4]
(ii) Any two constants with matching uses, one mark for the constant (name and value) and
one mark for the matching use. The constants and the matching uses must relate to the
tasks on the exam paper. There are several possible correct answers these are
examples only.
Constant 1 – MinBabyTemperature = 36.0
Use
– to keep the lowest acceptable baby temperature
Constant 2 – MaxBabyTemperature = 37.5
Use
– to keep the highest acceptable baby temperature
[4]
(b) Any five from
– prompt for baby’s temperature
– input baby’s temperature
– test for > 37.5
– … then output suitable message if this is the case
– test for < 36.0
– … then output suitable message if this is the case
– output suitable message if temperature between those values
Sample algorithm:
PRINT 'Please enter temperature of baby '
INPUT BabyTemperature
IF BabyTemperature > MaxBabyTemperature or 37.5
THEN Print 'Temperature too high'
ELSE
IF BabyTemperature < MinBabyTemperature or 36.0
THEN Print 'Temperature too low'
ELSE Print 'Temperature OK'
ENDIF
ENDIF
© Cambridge International Examinations 2015
[5]
.
Mark Scheme
223
Cambridge O Level – October/November 2015
Page 3
Syllabus
2210
Paper
22
(c) (i) Explanation
General marks award as seen
Give one mark for a mention of any one of the 4 checks below
If a mark is given for a check then mark the corresponding action taken
Maximum of five marks overall
General
– check all recorded temperatures (loop 18 times)
– update counter for those out of range
– output suitable message if counter >= 2
1
2
3
4
check if temperature range <= 1 and highest recorded not out of range and
lowest recorded not out of range
– ... exit
check if temperature range > 1...
– … output suitable message e.g. "Temperature range greater than one degree"
check if highest recorded temperature out of range…
– … output a suitable message if at least two recorded temperatures out of range
e.g. "Temperature too high on more than one occasion"
check if lowest recorded temperature out of range…
– … output a suitable message if at least two recorded temperatures out of range
e.g. "Temperature too low on more than one occasion"
[5]
(ii) Any two from
– only checks necessary conditions
– uses results from task 2
– checks for normal values first
© Cambridge International Examinations 2015
[2]
.
Mark Scheme
224
Cambridge O Level – October/November 2015
Page 4
Syllabus
2210
Paper
22
Section B
2
One mark for each error identified + suggested correction
line 4 or (Total =) Total + 1: this should read (Total =) Total + Num
line 5 or Counter = Counter + 1: delete this line
line 6 or (Average = )Total / Counter: swap lines 6 and 7
line 6 or (Average = )Total / Counter : this should read (Average =) Total / 50
[4]
3
(a)
Number 1 Trace table
X
Posn
New
5
1
0
10
100
2
T1
T2
1
2
1
1
1
0
Output
101
101
(1 mark)
(1 mark)
(1 mark)
Number 2 Trace table
X
Posn
New
T1
T2
12
1
0
10
0
6
0
6
100
0
3
0
3
1000
100
1
1
Output
1100
1100
(1 mark)
(1 mark)
(1 mark)
(b) Converts a (denary) number to binary
© Cambridge International Examinations 2015
[6]
[1]
.
Mark Scheme
225
Cambridge O Level – October/November 2015
Page 5
4
5
6
Syllabus
2210
Paper
22
There are many possible correct answers this is an example only.
Normal
e.g. 1.7
Extreme
0.5 or 2.0 only
Abnormal
e.g. one
[3]
– IF (… THEN … ELSE … ENDIF)
– CASE (… OF … OTHERWISE … ENDCASE)
[2]
(a) (i) One mark for every two correct types
Title
– text
Artist
– text
Description
– text/memo
Catalogue Number – text/(auto)number
Size
– number
Price
– currency/number
Arrived
– date
Sold
– “yes/no”/text/Boolean
0, 1 no marks
2, 3 one mark
4, 5 two marks
6, 7 three marks
8 four marks
[4]
(ii) Catalogue Number
[1]
(b) One mark for each correct different check
Catalogue Number Format check/Presence Check/Check Digit/Length check/uniqueness
check
Size
Type check/Presence Check/Range Check
Price
Type check/Presence Check/Range Check
Arrived
Type check/Presence Check/Range Check/Format check/Select from
calendar length check
[4]
(c)
Field:
Catalogue
Number
Title
Price
Artist
Sold
Table:
PICTURE
PICTURE
PICTURE
PICTURE
PICTURE
='Twister'
False
Sort:
Show:
Criteria:
or:
(1 mark)
(1 mark)
(1 mark)
(1 mark)
(1 mark)
[5]
© Cambridge International Examinations 2015
.
226
Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
* 3 3 0 4 3 8 2 2 2 0 *
0478/12
COMPUTER SCIENCE
Paper 1 Theory
May/June 2016
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
Answer all questions.
No marks will be awarded for using brand names of software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The maximum number of marks is 75.
The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
This document consists of 14 printed pages and 2 blank pages.
DC (NH/JG) 118886/3
© UCLES 2016
[Turn over
.
2
227
1
2
Complete the following by writing either compiler, interpreter or assembler in the spaces
provided.
.....................................................................
– translates source code into object code.
......................................................................
– translates low-level language into machine code.
......................................................................
– stops the execution of a program as soon as it
encounters an error.
[3]
Motion sensors are used in a security system to detect intruders.
Name three other sensors that could be used in the following applications.
Give a different type of sensor for each application.
Application
Sensor
controlling street lights
monitoring a river for pollution
controlling traffic lights
[3]
© UCLES 2016
0478/12/M/J/16
.
3
228
3
(a) Convert the following hexadecimal number into 12-bit binary:
4AF
[3]
(b) The 2016 Olympic Games will be held in Rio de Janeiro. A timer that counts down to the
opening of the Games is shown on a microprocessor-controlled display.
The number of hours, minutes and seconds until the Games open are held in three 8-bit
registers.
The present register values are:
0
1
1
0
1
0
0
1
105 hours
0
0
1
0
0
0
0
0
32 minutes
0
0
0
1
0
1
0
0
20 seconds
The timer will count down in seconds.
(i)
Show the values in each 8-bit register 30 seconds after the time shown above:
hours
minutes
seconds
[3]
(ii)
Write the hexadecimal value of the minutes register from part (b)(i).
.......................................................................................................................................[1]
© UCLES 2016
0478/12/M/J/16
[Turn over
.
4
229
4
Nigel wants to send a large text file electronically to Mashuda.
(a) Describe how the size of the text file can be reduced.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(b) This file will be transmitted to Mashuda as an email attachment. Mashuda then stores it on
her computer.
Explain how checksums can be used to verify that the file has not been corrupted during
transmission or data storage.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
© UCLES 2016
0478/12/M/J/16
.
5
230
5
Six descriptions and six devices are shown below.
Draw a line to link each description to the correct device.
Description
Device
Allows a user to write on a surface
using a pen; text and drawings are
then captured electronically and
stored for later use.
Digital Light Projector
Converts sound into an electrical
signal/voltage.
Inkjet printer
Uses thermal bubble and piezoelectric
technology to produce a hard copy.
Interactive whiteboard
Uses a bright white light source and
micro mirrors (on a chip) to produce
an image to be shone onto a wall or
screen.
Laser printer
Converts a hard copy document into
an electronic form to be stored as a
file on a computer.
Microphone
Uses negatively charged images on a
rotating drum and positively charged
toner to output a hard copy.
Scanner (2D)
[5]
© UCLES 2016
0478/12/M/J/16
[Turn over
.
6
231
6
(a) Three descriptions of data transmission are given below.
Tick (✓) the appropriate box in each table to show the:
•
•
type of transmission
method of transmission
Description 1:
Type
Data is transmitted several bits at
a time down several wires in both
directions simultaneously.
Tick
(✓)
Method
simplex
serial
half-duplex
parallel
Tick
(✓)
full-duplex
Description 2:
Type
Data is transmitted in one direction
only, one bit at a time, down a
single wire.
Tick
(✓)
Method
simplex
serial
half-duplex
parallel
Tick
(✓)
full-duplex
Description 3:
Type
Data is transmitted one bit at a
time down a single wire; the data
is transmitted in both directions
but not at the same time.
Tick
(✓)
Method
simplex
serial
half-duplex
parallel
Tick
(✓)
full-duplex
[6]
(b) Give two reasons why serial transmission, rather than parallel transmission, is used to
connect devices to a computer.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
© UCLES 2016
0478/12/M/J/16
.
7
232
7
(a)
$
;
%
&
Complete the truth table for this logic circuit.
A
B
C
0
0
0
0
0
1
0
1
0
0
1
1
1
0
0
1
0
1
1
1
0
1
1
1
Working space
X
[4]
© UCLES 2016
0478/12/M/J/16
[Turn over
.
8
233
(b) Draw a logic circuit corresponding to the following logic statement:
X = 1 if ( ( A is 1 OR B is 1 ) AND ( A is 1 AND B is 1 ) ) OR ( C is NOT 1 )
$
%
;
&
[5]
© UCLES 2016
0478/12/M/J/16
.
9
234
(c) Re-draw the following logic circuit using NAND gates only.
$
;
%
&
Logic circuit re-drawn:
$
%
;
&
[4]
© UCLES 2016
0478/12/M/J/16
[Turn over
.
210
35
8
(a) Five statements and three types of software are shown below.
Draw lines to connect each statement with the correct type of software.
Statement
Type of software
Users have the freedom to pass on
the software to friends and family as
they wish.
Free software
Users can download this software free
of charge, but they cannot modify the
source code in any way.
Users are allowed to try out the
software for a trial period only before
being charged.
Freeware
Users can study the software source
code and modify it, where necessary,
to meet their own needs, without
breaking copyright laws.
Shareware
Users can obtain a free trial version
of the software, but this often does
not contain all the features of the full
version.
[3]
© UCLES 2016
0478/12/M/J/16
.
211
36
(b) Describe three ethical issues that should be considered when using computers.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
(c) Security of data is very important.
Three security issues are viruses, pharming and spyware.
Explain what is meant by each issue.
Viruses: .....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Pharming: .................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Spyware: ...................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
© UCLES 2016
0478/12/M/J/16
[Turn over
.
212
37
(d) Describe three tasks carried out by a firewall.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
9
In the following barcode, each binary number is made up of seven bars.
Each bar is black or grey.
A black bar is interpreted as a “1” and a grey bar is interpreted as a “0”.
(a) Write the binary numbers that would be produced from this barcode:
%LQDU\QXPEHU$ %LQDU\QXPEHU%
Binary number A:
Binary number B:
[2]
(b) This barcode system uses odd parity.
Write the parity bit for each of the binary numbers in part (a):
Parity bit
Binary number A:
Binary number B:
[2]
© UCLES 2016
0478/12/M/J/16
.
213
38
10 There are six descriptions in the table below.
Complete the table below by writing the correct storage device or media in the box next to each
description.
Description
Storage device or media
Non-volatile memory that can only be read from and not
written to.
Optical storage media that allows very high storage capacity
by using blue/violet laser technology.
Volatile memory that stores data, programs and the parts of
the operating system that are currently in use.
Optical storage media that uses a single spiral track and uses
dual layer technology, allowing high data storage capacity.
Device that stores data by controlling the movement of
electrons within a microchip; there are no moving parts.
Optical storage media that uses concentric tracks allowing
writing and reading to take place at the same time.
[6]
© UCLES 2016
0478/12/M/J/16
[Turn over
.
214
39
11 Describe the use of structure and presentation in a HTML document.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
© UCLES 2016
0478/12/M/J/16
.
240
Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
COMPUTER SCIENCE
0478/12
May/June 2016
Paper 1
MARK SCHEME
Maximum Mark: 75
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2016 series for most Cambridge IGCSE®,
Cambridge International A and AS Level components and some Cambridge O Level components.
® IGCSE is the registered trademark of Cambridge International Examinations.
This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
This document consists of 10 printed pages.
© UCLES 2016
[Turn over
.
Mark Scheme
241
Cambridge IGCSE – May/June 2016
Page 2
1
compiler
Syllabus
0478
Paper
12
assembler
interpreter
[3]
2
Application
Sensor
controlling street lights
Light
monitoring a river for pollution
Gas, pH, temperature, light
controlling traffic lights
pressure, magnetic field,
NOTE: The same sensor cannot be given twice
3
[3]
(a) 1 mark for each nibble
0100 1010 1111
(b) (i) 0 1 1 0 1 0 0 1
00011111
00110010
[3]
105 hours
31 minutes
50 seconds
1 mark
1 mark
1 mark
(ii) 1F
[3]
[1]
© Cambridge International Examinations 2016
Page 3
4
.
Mark Scheme
242
Cambridge IGCSE – May/June 2016
Syllabus
0478
Paper
12
(a) Any three from:
– The file can be compressed
– The compression that is used is lossless (not lossy)
– use of a compression algorithm
– repeated words can be indexed
– repeated word sections (e.g. “OU”) can be replaced by a numerical value
– reference to zip files
– save file as a pdf/convert to pdf
[3]
(b) Any four from:
– the checksum for the bytes is calculated
– this value is then transmitted with the block of data
– at the receiving end, the checksum is re-calculated from the block of data received
– the calculated value is then compared to the checksum transmitted
– if they are the same value, then the data was transmitted without any error
– if the values are different, then an error has been found
– if the values are different, then a request is sent for the data to be re-transmitted
[4]
© Cambridge International Examinations 2016
Page 4
.
Mark Scheme
243
Cambridge IGCSE – May/June 2016
5
Syllabus
0478
Description
Device
Allows a user to write on a
surface using a pen; text and
drawings are then captured
electronically and stored for
later use.
Digital Light Projector
Converts sound into an
electrical signal/voltage.
Uses thermal bubble and
piezoelectric technology to
produce a hard copy.
Paper
12
Inkjet printer
Interactive whiteboard
Uses a bright white light source
and micro mirrors (on a chip) to
produce an image to be shone
onto a wall or screen.
Converts a hard copy document
into an electronic form to be
stored as a file on a computer.
Uses negatively charged
images on a rotating drum and
positively charged toner to
output a hard copy.
5/6 matches – 5 marks
4 matches – 4 marks
3 matches – 3 marks
2 matches – 2 marks
1 match – 1 mark
© Cambridge International Examinations 2016
Laser printer
Microphone
Scanner (2D)
[5]
Page 5
6
.
Mark Scheme
244
Cambridge IGCSE – May/June 2016
(a)
Type
Tick
()
Method
simplex
serial
half-duplex
parallel
full-duplex
Type
simplex
Syllabus
0478
Paper
12
Tick
()
Tick
()
half-duplex
Method
serial
Tick
()
parallel
full-duplex
Type
Tick
()
simplex
half-duplex
Method
serial
Tick
()
parallel
full-duplex
[6]
(b) Any two from:
– single wire means there is less chance of interference/data corruption
– single wire reduces costs
– more reliable over greater distances
– bits will still be synchronised after transmission
© Cambridge International Examinations 2016
[2]
.
Mark Scheme
245
Cambridge IGCSE – May/June 2016
Page 6
7
(a)
Working space
Syllabus
0478
A
B
C
0
0
0
0
0
0
1
1
0
1
0
0
0
1
1
1
1
0
0
0
1
0
1
1
1
1
0
1
1
1
1
0
4 marks for 8 correct X bits
3 marks for 6 correct X bits
2 marks for 4 correct X bits
1 mark for 2 correct X bits
© Cambridge International Examinations 2016
Paper
12
X
[4]
.
Mark Scheme
246
Cambridge IGCSE – May/June 2016
Page 7
Syllabus
0478
Paper
12
(b) 1 mark for each correct gate with correct source of input
A
X
B
C
[5]
(c) Each dotted area is 1 mark
A
X
B
C
[4]
© Cambridge International Examinations 2016
Page 8
8
.
Mark Scheme
247
Cambridge IGCSE – May/June 2016
Syllabus
0478
Paper
12
(a) 1 mark for correct lines from each type of software
NOTE: all statements that are correct must be connected to the correct type of
software for the mark to be awarded
Statement
Type of software
Users have the freedom to
pass on the software to
friends and family as they
wish.
Free software
Users can download this
software free of charge, but
they cannot modify the
source code in any way.
Users are allowed to try out
the software for a trial period
only before being charged.
Freeware
Users can study the software
source code and modify it,
where necessary, to meet
their own needs, without
breaking copyright laws.
Shareware
Users can obtain a free trial
version of the software, but
this often does not contain all
the features of the full
version.
[3]
© Cambridge International Examinations 2016
Page 9
.
Mark Scheme
248
Cambridge IGCSE – May/June 2016
Syllabus
0478
Paper
12
(b) Any three from:
– That we should follow Copyright laws/intellectual property rights/work should not be
stolen/plagiarised
– That we should follow Data Protection laws
– That we should not create or distribute malware//description of malware
– That we should not hack/crack other computers//description of hacking
– That we should protect our own computers against malware/hacking
– That we should consider privacy issues (when using social networking)
– That we consider anonymity issues (when using social networking)
– That we should consider environmental impacts when using computers
– Loss/creation of jobs from use of computers/robotics
– We should follow codes of practice (for creation of code e.g. ACM/IEEE)
[3]
(c) 2 marks for each term described
Viruses:
– program/software/file that replicates (copies) itself
– intends to delete or corrupt files//fill up hard disk space
Pharming:
– malicious code stored on a computer/web server
– redirects user to fake website to steal user data
Spyware:
– monitors and relays user activity e.g. key presses//key logging software
– user activity/key presses can be analysed to find sensitive data e.g. passwords
[6]
(d) Any three from:
– examines/monitors traffic to and from a user’s computer and a network/Internet
– checks whether incoming and outgoing traffic meets a given set of criteria/rules
– firewall blocks/filters traffic that doesn’t meet the criteria/rules
– logs all incoming and outgoing traffic
– can prevent viruses or hackers gaining access
– blocks/filters access to specified IP addresses/websites
– warns users of attempts by software (in their computer) trying to access external data
sources (e.g. updating of software) etc. // warns of attempted unauthorised access to
the system
[3]
© Cambridge International Examinations 2016
Page 10
9
.
Mark Scheme
249
Cambridge IGCSE – May/June 2016
(a)
Syllabus
0478
Binary number A:
1
1
1
0
0
1
0
Binary number B:
1
0
0
1
1
1
0
Paper
12
[2]
(b)
Parity Bit
Binary number A
1
Binary number B
1
[2]
10 1 mark for each correct storage device
ROM (not EPROM/PROM)
Blu-ray disc
RAM
DVD/ DVD-R(+R)/ DVD-RW(+RW)/ DVD-ROM (not CD or DVD-RAM)
SSD/example of a USB storage device
DVD-RAM
[6]
11 1 mark for each correct point
– Presentation is used to format colour/style
– Structure is used to create layout
– In a HTML document structure and presentation are often kept separate
– By keeping the presentation separate it is easier to update colour/font
– Presentation is often stored in a file called a CSS …
– … the CSS in then linked to the HTML document to implement the presentation requirements
– (Mark-up) tags are used to define the structure of the document …
– … presentation and formatting can also be included within the tags
[4]
© Cambridge International Examinations 2016
.
250
Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
* 0 7 3 3 6 7 4 3 7 5 *
0478/13
COMPUTER SCIENCE
Paper 1 Theory
May/June 2016
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
Answer all questions.
No marks will be awarded for using brand names of software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The maximum number of marks is 75.
The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
This document consists of 13 printed pages and 3 blank pages.
DC (ST/CGW) 126906
© UCLES 2016
[Turn over
.
2
251
1
Some software can be described as free, freeware or shareware.
Tick (✓) the appropriate boxes in the table below to show which features apply to these three
types of software.
Software feature
Free
Freeware
Shareware
Software source code can be freely accessed and
modified as required
All the features of the full version of the software
are not made available; the full version needs to be
purchased first
The original software is subject to all copyright laws
It is possible to distribute modified versions or
copies of the software to friends and family
[3]
2
Hexadecimal codes are used in MAC addresses.
(a) State what is meant by the term MAC.
...............................................................................................................................................[1]
(b) Explain what the hexadecimal code in a MAC address represents.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
© UCLES 2016
0478/13/M/J/16
.
3
252
3
(a) Five sensors and five applications are shown below.
Draw a line to link each sensor to its most appropriate application.
Sensor
Application
Light
sensor
Monitor the pollution levels in a river
Moisture
sensor
Control the switching off and on of
street lights
Gas
sensor
Detect intruders breaking into a
building
pH
sensor
Monitor the amount of water left in
clothes in a dryer
Pressure
sensor
Monitor acidity levels in the soil in a
greenhouse
[4]
(b) Automatic doors in a building are controlled by the use of infrared sensors and a
microprocessor.
Describe how the sensors and the microprocessor are used to automatically open a door as
a person approaches.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
© UCLES 2016
0478/13/M/J/16
[Turn over
.
4
253
4
(a) Nikita wishes to print out some documents and connects her printer to the computer using
one of the USB ports.
(i)
Identify what type of data transmission is being used.
.......................................................................................................................................[1]
(ii)
Give three reasons for using a USB port.
1 .......................................................................................................................................
...........................................................................................................................................
2 .......................................................................................................................................
...........................................................................................................................................
3 .......................................................................................................................................
...........................................................................................................................................
[3]
(iii)
The printer runs out of paper while it is printing the documents. A signal is sent to the
processor to request that the problem is dealt with.
Name this type of signal.
.......................................................................................................................................[1]
(b) State one suitable application for each printer below. A different application must be given for
each printer.
Inkjet printer ..............................................................................................................................
...................................................................................................................................................
3D printer ..................................................................................................................................
...................................................................................................................................................
[2]
© UCLES 2016
0478/13/M/J/16
.
5
254
(c) Name another type of printer and describe one way in which it is different from the printers
named in part (b).
Give an application for this printer.
Type of printer ...........................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Application ................................................................................................................................
...................................................................................................................................................
[3]
© UCLES 2016
0478/13/M/J/16
[Turn over
.
6
255
5
A computer-controlled machine produces plastic sheets. The thickness of each sheet must be
within a certain tolerance. The sheets are kept below 50 °C as they move over rollers at 10 metres
per second.
Three parameters need to be monitored all the time.
Parameter
D
S
T
Description
Binary
value
Conditions
1
thickness of sheet in tolerance
0
thickness of sheet out of tolerance
1
roller speed = 10 metres/second
0
roller speed <> 10 metres/second
1
temperature < 50 °C
0
temperature >= 50 °C
sheet thickness
roller speed
temperature
An alarm, X, will sound if:
thickness is in tolerance AND (roller speed <> 10 metres/second OR temperature >= 50 °C)
OR
roller speed = 10 metres/second AND temperature >= 50 °C
(a) Draw a logic circuit to represent the above monitoring system.
D
S
X
T
[6]
© UCLES 2016
0478/13/M/J/16
.
7
256
(b) Complete the truth table for the monitoring system.
D
S
T
0
0
0
0
0
1
0
1
0
0
1
1
1
0
0
1
0
1
1
1
0
1
1
1
Working Space
X
[4]
6
Secure socket layer (SSL) is used in the security of information on Internet websites.
(a) State how it is possible for a user to know that a website is secure by looking at the web
address.
...................................................................................................................................................
...............................................................................................................................................[1]
(b) Describe three of the stages a web browser goes through to detect whether a website is
secure.
1 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
© UCLES 2016
0478/13/M/J/16
[Turn over
.
8
257
7
Each seat on a flight is uniquely identified on an LCD above the seat. For example, seat 035C is
shown as:
The first three characters are digits that represent the row.
The fourth character is the seat position in that row. This is a single letter, A to F, that is stored as a
hexadecimal value.
Each of the four display characters can be stored in a 4-bit register. For example, 0 and C would
be represented as:
0:
C:
8
4
2
1
0
1
0
1
0
0
0
0
(a) Show how the 4-bit registers would store the remaining two characters, 3 and 5.
3
5
[2]
(b) Identify which seat is stored in the following 4-bit registers.
0
0
0
1
1
0
0
1
0
1
0
0
1
1
1
0
[2]
© UCLES 2016
0478/13/M/J/16
.
9
258
8
A bank offers an online service to its customers. The bank has developed a “SafeToUse” system
that asks each customer to enter four randomly chosen characters from their password each time
they log in.
The customer selects these four characters from drop-down boxes. For example:
Please select the
2nd character
5th character
6th character
8th character
(a) (i)
Explain why it is more secure to use drop-down boxes rather than entering characters
using a keyboard.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(ii)
Give a reason why the system asks for four characters chosen at random.
...........................................................................................................................................
.......................................................................................................................................[1]
(b) Biometrics is an additional form of security.
Give two examples of biometrics.
1 ...............................................................................................................................................
2 ...............................................................................................................................................
[2]
© UCLES 2016
0478/13/M/J/16
[Turn over
.
210
59
9
Check digits are used to ensure the accuracy of entered data.
A 7-digit number has an extra digit on the right, called the check digit.
digit position:
1
2
3
4
5
6
7
8
digit:
–
–
–
–
–
–
–
–
check digit
The check digit is calculated as follows:
•
•
•
•
each digit in the number is multiplied by its digit position
the seven results are then added together
this total is divided by 11
the remainder gives the check digit (if the remainder = 10, the check digit is X)
(a) Calculate the check digit for the following number. Show all your working.
4
2
4
1
5
0
8
…
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Check digit ................................................................................................................................
[2]
(b) An operator has just keyed in the following number:
3
2
4
0
0
4
5
X
Circle below correct if the check digit is correct OR incorrect if the check digit is incorrect.
correct
incorrect
Explain your answer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
© UCLES 2016
0478/13/M/J/16
.
211
60
10 Six security issues and six descriptions are shown below.
Draw a line to link each security issue to its correct description.
Security issue
Description
Pharming
illegal access to a computer system
without the owner’s consent or
knowledge
Phishing
software that gathers information by
monitoring key presses on a user’s
keyboard; the data is sent back to the
originator of the software
Viruses
malicious code installed on the hard
drive of a user’s computer or on a web
server; this code will re-direct the user
to a fake website without the user’s
knowledge
Hacking
creator of code sends out a
legitimate-looking email in the hope
of gathering personal and financial
information from the recipient; it
requires the user to click on the link in
the email or attachment
Spyware
a message given to a web browser by
a web server; it is stored in a text file;
the message is then sent back to the
server each time the browser requests
a page from the server
Cookies
program or code that replicates itself;
designed to amend, delete or copy
data or files on a user’s computer;
often causes the computer to crash or
run slowly
[5]
© UCLES 2016
0478/13/M/J/16
[Turn over
.
212
61
11 (a) Four examples of optical storage media are:
•
•
•
•
DVD-RW
DVD-RAM
CD-ROM
Blu-ray disc
The table below shows four features of optical storage media.
Tick (✓) the appropriate boxes in the table to indicate which of the features apply to each
example of optical storage media.
Single track
Many
concentric
tracks
Blue laser
used to read/
write data
Red laser
used to read/
write data
DVD-RW
DVD-RAM
CD-ROM
Blu-ray disc
[4]
(b) Solid state drives (SSD) are replacing hard disc drives (HDD) in some computers.
(i)
Give three reasons why this is happening.
1 .......................................................................................................................................
...........................................................................................................................................
2 .......................................................................................................................................
...........................................................................................................................................
3 .......................................................................................................................................
...........................................................................................................................................
[3]
(ii)
Explain why many web servers still use hard disc drive (HDD) technology.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
© UCLES 2016
0478/13/M/J/16
.
213
62
12 (a) Name the following type of barcode:
...............................................................................................................................................[1]
(b) The barcode in part (a) contains the denary value
2640
Convert this value to hexadecimal.
...................................................................................................................................................
...................................................................................................................................................
Write the value as a 12-bit binary number.
[4]
(c) An airport uses the type of barcode shown in part (a) to advertise local places of interest.
Describe how a visitor landing at the airport could use these barcodes to help plan their visit.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
© UCLES 2016
0478/13/M/J/16
.
263
Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
COMPUTER SCIENCE
0478/13
May/June 2016
Paper 1
MARK SCHEME
Maximum Mark: 75
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2016 series for most Cambridge IGCSE®,
Cambridge International A and AS Level components and some Cambridge O Level components.
® IGCSE is the registered trademark of Cambridge International Examinations.
This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
This document consists of 10 printed pages.
© UCLES 2016
[Turn over
1
.
Mark Scheme
264
Cambridge IGCSE – May/June 2016
Page 2
1 mark for each correct column
Software feature
Free
Software source code can be freely accessed
and modified as required
Syllabus
0478
Freeware
Shareware
All the features of the full version of the software
are not made available; the full version needs to
be purchased first
The original software is subject to all of the
copyright laws
It is possible to distribute modified versions or
copies of the software to friends and family
Paper
13
(1 mark)
(1 mark)
(1 mark)
[3]
2
(a) media access control
[1]
(b) Any three from:
–
–
–
–
–
hardware/physical address
unique address/number associated (with network card in) a device/computer
usually 48/64 bits (12/16 hex digits)
first 6/8 digits = manufacturer code/ID of device (NIC)
last 6/8 digits = serial number of device (NIC)
© Cambridge International Examinations 2016
[3]
.
Mark Scheme
265
Cambridge IGCSE – May/June 2016
Page 3
3
(a)
Light
sensor
Syllabus
0478
Paper
13
Monitoring the pollution levels in a river
Moisture
sensor
Control the switching off and on of
street lighting
Gas
sensor
Detection of intruders breaking into a
building
pH
sensor
Monitor the amount of water left in
clothes in a drier
Pressure
sensor
Monitor acidity levels in the soil in a
greenhouse
4/5 matches – 4 marks
3 matches – 3 marks
2 matches – 2 marks
1 match – 1 mark
[4]
(b) Any four from:
–
–
–
–
–
–
sensor(s) sends signal/data to microprocessor
signal/data converted to digital (using an ADC)
microprocessor compares signal/data with pre-set/stored value
if sensor(s) signal/data indicates the presence of a person / the door needs to be opened
/ a match is found / door is closed …
… microprocessor sends a signal to an actuator …
… to operate/drive a motor to open the door
[4]
© Cambridge International Examinations 2016
4
.
Mark Scheme
266
Cambridge IGCSE – May/June 2016
Page 4
(a) (i) serial
Syllabus
0478
Paper
13
[1]
(ii) Any three from:
– automatically detects the hardware/installs drivers
– plug only goes in one way/can’t connect incorrectly
– supports different data transmission speeds/a range of data transmission speeds
– has become the industry standard/universally used
– backwards compatible (with earlier versions of USB ports)
[3]
(iii) interrupt
[1]
(b) 1 mark each use of printer, max 1 mark per printer.
inkjet printer
– (small quantities of) documents
– photographs
3D printer
– (physical) prototype (from CAD)
– (physical) model (from a blueprint)
[2]
(c) 1 mark for naming printer + 1 mark for description + 1 mark for application
Laser printer
–
–
–
–
–
–
–
uses toner/powder ink
uses (positive and negative) charged drums // rotating drum
uses static charge
no moving head
faster at printing
high volume output/high speed
producing flyers/leaflets/magazines
This is an example, other types of printers can be credited.
© Cambridge International Examinations 2016
[3]
.
Mark Scheme
267
Cambridge IGCSE – May/June 2016
Page 5
5
Syllabus
0478
Paper
13
(a) 1 mark for each correct gate, with correct source of input(s)
[6]
(b)
D
S
T
Working Space
0
0
0
0
0
0
1
0
0
1
0
1
0
1
1
0
1
0
0
1
1
0
1
1
1
1
0
1
1
1
1
0
4 marks for 8 correct X bits
3 marks for 6 correct X bits
2 marks for 4 correct X bits
1 mark for 2 correct X bits
© Cambridge International Examinations 2016
X
[4]
.
Mark Scheme
268
Cambridge IGCSE – May/June 2016
Page 6
6
Syllabus
0478
Paper
13
(a) Any one from:
–
–
protocol ends in “s”
use of https
[1]
(b) Any three from:
–
–
–
–
–
–
7
requests web server to identify itself/view the (SSL) certificate
receives a copy of the (SSL) certificate, sent from the webserver
checks if SSL certificate is authentic/trustworthy
sends signal back to webserver that the certificate is authentic/trustworthy
starts to transmit data once connection is established as secure
if website is not secure browser will display an open padlock/warning message
[3]
(a) 1 mark for each correct binary value
3
0
0
1
1
5
0
1
0
1
[2]
(b)
0
0
0
1
1
1
0
0
1
9
0
1
0
0
4
1
1
1
0
E
1 mark
1 mark
[2]
© Cambridge International Examinations 2016
8
.
Mark Scheme
269
Cambridge IGCSE – May/June 2016
Page 7
(a) (i) Any two from:
–
–
–
–
–
Syllabus
0478
Paper
13
to protect against key logging software/spyware
can stop key presses being recorded
can stop key presses being relayed
drop down boxes cannot be recorded as key presses
drop down boxes can be placed in different location on the screen each time
(to overcome screen capture issues)
[2]
(ii) Any one from:
–
–
–
–
hacker never finds all characters on the first hack
makes it more difficult for hackers to find the order of the characters
hacker needs to hack the system several times to gain the whole password
shoulder surfing will not give person full password
[1]
(b) Any two from:
–
–
–
–
9
fingerprint scanner
face recognition software
retina scanner/iris scanner
voice recognition software
[2]
(a) 1 mark for correct check digit and 1 mark for showing the calculation
(4 × 1) + (2 × 2) + (4 × 3) + (1 × 4) + (5 × 5) + (0 × 6) + (8 × 7)
= 4 + 4 + 12 + 4 + 25 + 0 + 56 = 105
1 mark for any correct
line of working
105/11 = 9 remainder 6
check digit is: 6
[2]
(b) incorrect check digit
[1]
–
–
–
check digit should be 1
(3*1) + (2*2) + (4*3) + (0*4) + (0*5) + (4*6) + (5*7) // 3 + 4 + 12 + 0 + 0 + 24 + 35 //
Total = 78
78/11 gives 7 remainder 1
© Cambridge International Examinations 2016
[2]
.
Mark Scheme
270
Cambridge IGCSE – May/June 2016
Page 8
10
Syllabus
0478
Paper
13
illegal access to a computer system
without the owner’s consent or
knowledge
Pharming
software that gathers information by
monitoring key presses on a user’s
keyboard; the information is relayed back
to the originator of the software
Phishing
Viruses
malicious code installed on the hard drive
of a user’s computer or on a web server;
this code will re-direct the user to a fake
website without the user’s knowledge
Hacking
creator of code sends out a legitimatelooking email in the hope of gathering
personal and financial information from
the recipient; it requires the user to click
on the link in the email or attachment
a message given to a web browser by a
web server; it is stored in a text file; the
message is then sent back to the server
each time the browser requests a page
from the server
Spyware
program or code that replicates itself
designed to amend, delete or copy data
or files on a user’s computer; often
causes the computer to crash or run
slowly
Cookies
5/6 matches – 5 marks
4 matches – 4 marks
3 matches – 3 marks
2 matches – 2 marks
1 match – 1 mark
© Cambridge International Examinations 2016
[5]
.
Mark Scheme
271
Cambridge IGCSE – May/June 2016
Page 9
11 (a) 1 mark for each correct row
Single track
Many
concentric
tracks
DVD-RAM
CD-ROM
Blu-ray disc
Paper
13
Red laser
Blue laser
used to read/ used to read/
write data
write data
DVD-RW
Syllabus
0478
1 mark
1 mark
1 mark
1 mark
[4]
(b) (i) Any three from:
–
–
–
–
–
–
–
–
don’t need to “get up to speed” to work properly/no latency
lower/less power consumption/more energy efficient
run cooler
run quieter
data access is faster
occupies less physical space/more compact
lighter, so more suitable for a portable computer/laptop
no moving parts so more reliable/durable in a portable computer/laptop
[3]
(ii) Any two from:
–
–
–
–
HDD is cheaper for larger amounts of storage space
HDD has greater longevity for read/write functions
Expensive to change the technology // HDD are trusted technology
No requirement for the increased speed of SSD
© Cambridge International Examinations 2016
[2]
.
Mark Scheme
272
Cambridge IGCSE – May/June 2016
Page 10
12 (a) QR (quick response) Code
(b) –
Syllabus
0478
Paper
13
[1]
A 5 0 (1 mark)
1
0
1
1 mark
0
0
1
0
1
0
0
1 mark
0
0
1 mark
[4]
(c) Any three from:
-
visitor scans the QR code with (the camera on) the mobile device
App is used to read/interpret the QR code
links to a website/opens a document …
… to access local tourist information
can store the QR code to refer to again for the information
© Cambridge International Examinations 2016
[3]
.
273
Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
0478/22
COMPUTER SCIENCE
Paper 2 Problem-solving and Programming
May/June 2016
PRE-RELEASE MATERIAL
No Additional Materials are required.
* 7 5 2 8 5 0 0 7 1 8 *
This material should be given to the relevant teachers and candidates as soon as it has been received
at the Centre.
READ THESE INSTRUCTIONS FIRST
Candidates should use this material in preparation for the examination. Candidates should attempt the
practical programming tasks using their chosen high-level, procedural programming language.
The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
This document consists of 2 printed pages.
DC (LK) 106761/3
© UCLES 2016
[Turn over
.
2
274
In preparation for the examination candidates should attempt the following practical tasks by writing
and testing a program(s).
The manager of a building materials delivery service needs a program to check the contents and weight
of sacks to ensure that correct orders are made up for delivery. A price for the order will be calculated.
Write and test a program for the manager.
•
Your program must include appropriate prompts for the entry of data.
•
Error messages and other output need to be set out clearly.
•
All variables, constants and other identifiers must have meaningful names.
You will need to complete these three tasks. Each task must be fully tested.
TASK 1 – Check the contents and weight of a single sack
Each sack must obey the following rules to be accepted:
•
•
•
contain cement, gravel or sand, with a letter on the side for easy identification
o C - cement
o G - gravel
o S - sand
sand or gravel must weigh over 49.9 and under 50.1 kilograms
cement must weigh over 24.9 and under 25.1 kilograms
Input and store the weight and contents for one sack. The contents must be checked and an incorrect
sack rejected. The weight must be validated on entry and an overweight or underweight sack rejected.
Output the contents and weight of an accepted sack. If a sack is rejected, output the reason(s).
TASK 2 – Check a customer’s order for delivery
Input and store the number of sacks of each type required for the order. Use TASK 1 to check the
contents and weight of each sack. Ensure that the delivery contains the correct number and type of
sacks for the order.
Output the total weight of the order.
Output the number of sacks rejected from the order.
TASK 3 – Calculate the price for a customer’s order
Extend TASK 2 to calculate a price for an order. Prices for the sacks are as follows:
•
•
regular price for each sack
o cement, $3
o gravel, $2
o sand, $2
discount price for a special pack containing 1 sack of cement, 2 sacks of sand and 2 sacks of
gravel, $10
Calculate and output the regular price for the order. Check how many special packs are in the order. If
a discount price applies then output the new price for the order and the amount saved.
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
© UCLES 2016
0478/22/M/J/16
.
275
Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
* 9 6 2 0 1 2 8 5 4 9 *
0478/22
COMPUTER SCIENCE
Paper 2 Problem-solving and Programming
May/June 2016
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
Answer all questions.
DO NOT ATTEMPT TASKS 1, 2 AND 3 in the pre-release material; these are for information only.
You are advised to spend no more than 40 minutes on Section A (Question 1).
No marks will be awarded for using brand names of software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The maximum number of marks is 50.
The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
This document consists of 11 printed pages and 1 blank page.
DC (LK/SW) 106762/3
© UCLES 2016
[Turn over
.
2
276
Section A
You are advised to spend no longer than 40 minutes answering this section.
Here is a copy of the pre-release material.
DO NOT attempt Tasks 1, 2 and 3 now.
Use the pre-release material and your experience from attempting the tasks before the examination to
answer Question 1.
Pre-release Material
The manager of a building materials delivery service needs a program to check the contents and
weight of sacks to ensure that correct orders are made up for delivery. A price for the order will be
calculated.
Write and test a program for the manager.
•
•
•
Your program must include appropriate prompts for the entry of data.
Error messages and other output need to be set out clearly.
All variables, constants and other identifiers must have meaningful names.
You will need to complete these three tasks. Each task must be fully tested.
TASK 1 – Check the contents and weight of a single sack
Each sack must obey the following rules to be accepted:
•
•
•
contain cement, gravel or sand, with a letter on the side for easy identification
o C - cement
o G - gravel
o S - sand
sand or gravel must weigh over 49.9 and under 50.1 kilograms
cement must weigh over 24.9 and under 25.1 kilograms
Input and store the weight and contents for one sack. The contents must be checked and an incorrect
sack rejected. The weight must be validated on entry and an overweight or underweight sack rejected.
Output the contents and weight of an accepted sack. If a sack is rejected, output the reason(s).
TASK 2 – Check a customer’s order for delivery
Input and store the number of sacks of each type required for the order. Use TASK 1 to check the
contents and weight of each sack. Ensure that the delivery contains the correct number and type of
sacks for the order.
Output the total weight of the order.
Output the number of sacks rejected from the order.
TASK 3 – Calculate the price for a customer’s order
Extend TASK 2 to calculate a price for an order. Prices for the sacks are as follows:
•
•
regular price for each sack
o cement, $3
o gravel, $2
o sand, $2
discount price for a special pack containing 1 sack of cement, 2 sacks of sand and 2 sacks of
gravel, $10
Calculate and output the regular price for the order. Check how many special packs are in the order. If
a discount price applies then output the new price for the order and the amount saved.
© UCLES 2016
0478/22/M/J/16
.
3
277
1
(a) All variables, constants and other identifiers should have meaningful names.
(i)
For three of the variables that you have used in Task 2, state the name, type and its use.
Variable 1 name ................................................................................................................
Type ...................................................................................................................................
Use ....................................................................................................................................
Variable 2 name ................................................................................................................
Type ...................................................................................................................................
Use ....................................................................................................................................
Variable 3 name ................................................................................................................
Type ...................................................................................................................................
Use ................................................................................................................................[3]
(ii)
State three constants that you could have used for Task 1. Give the value that would be
assigned to each one.
Constant 1 name ...............................................................................................................
Value 1 ..............................................................................................................................
Constant 2 name ...............................................................................................................
Value 2 ..............................................................................................................................
Constant 3 name ...............................................................................................................
Value 3 ..........................................................................................................................[3]
© UCLES 2016
0478/22/M/J/16
[Turn over
.
4
278
(b) Write an algorithm to complete Task 2, using either pseudocode, programming statements
or a flowchart. You can assume that the weight and contents have already been checked and
accepted in Task 1. You do not need to output the number of sacks rejected.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
© UCLES 2016
0478/22/M/J/16
.
5
279
(c) (i)
Give two different data values that could be used to check your validation rules for sand
in Task 1. Explain why you chose each value.
Sand data value 1 .............................................................................................................
Reason for choice .............................................................................................................
...........................................................................................................................................
Sand data value 2 .............................................................................................................
Reason for choice .............................................................................................................
.......................................................................................................................................[2]
(ii)
Give two different data values that could be used to check your validation rules for
cement in Task 1. Explain why you chose each value.
Cement data value 1 ..........................................................................................................
Reason for choice ..............................................................................................................
...........................................................................................................................................
Cement data value 2 ..........................................................................................................
Reason for choice ..............................................................................................................
.......................................................................................................................................[2]
(d) Explain how your program calculates the price for an order (Task 3). You may include
programming statements as part of your explanation.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
© UCLES 2016
0478/22/M/J/16
[Turn over
.
6
280
Section B
2
Read this section of program code that inputs 10 positive numbers and then outputs the total.
1
Total = 0
2
Counter = 0
3
REPEAT
4
INPUT Num
5
Total = Total + Num
6
PRINT Total
7
Counter = Counter + 1
8
UNTIL Counter = 10
This code works, but it is inefficient.
(i)
Suggest three improvements that could be made.
1 .................................................................................................................................................
...................................................................................................................................................
2 .................................................................................................................................................
...................................................................................................................................................
3 .................................................................................................................................................
...............................................................................................................................................[3]
(ii) Rewrite the program code with your improvements.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
© UCLES 2016
0478/22/M/J/16
.
7
281
3
The flowchart below calculates the number of tins of paint required to paint walls. The flowchart
inputs the height and width of a wall in metres, the number of doors and the number of windows.
A value of –1 for the height stops the input.
START
Area
Tins
0
0
INPUT Height,
Width, Doors,
Windows
Is
Height
= –1?
Yes
Tins
INT(Area/10 + 0.5)
No
OUTPUT Tins
Area
Area + Height * Width
– Doors * 1.5 – Windows
END
Complete the trace table for the input data:
3, 5, 1, 0, 3, 7, 0, 0, 3, 5, 0, 3, 3, 7, 1, 1, –1, 0, 0, 0
Area
Tins
Height
Width
Doors
Windows
[4]
© UCLES 2016
0478/22/M/J/16
[Turn over
.
8
282
4
Four statement types and four examples are shown below.
Draw a line to connect each statement type to the correct example.
Statement type
Example
Assignment
FOR X
1 TO 10
Iteration
READ X
Input
PRINT X
Output
X
Y + Z
[3]
5
A programmer writes a program to store a patient’s temperature every hour for a day.
State the data structure that would be most suitable to use and give the reason for your choice.
Data structure ...................................................................................................................................
Reason ..............................................................................................................................................
......................................................................................................................................................[2]
6
Identify two different selection statements that you can use when writing pseudocode.
1 ........................................................................................................................................................
..........................................................................................................................................................
2 ........................................................................................................................................................
......................................................................................................................................................[2]
© UCLES 2016
0478/22/M/J/16
.
210
83
7
A database, SOFASELECT, was set up to show the prices of suites, sofas and chairs for sale from
an online furniture warehouse. Part of the database is shown below.
Brochure
Number
Number
of Seats
Number
of Pieces
Material
Colour
Sofa
SF17
2
1
Leather
Red
950
Sofa
SF19
3
1
Vinyl
Black
1,000
Suite
SU10
4
3
Velvet
Green
1,500
Suite
SU23
5
3
Leather
Brown
950
Recliner chair
RC01
1
1
Leather
Cream
600
Chair
CH16
1
1
Vinyl
Red
250
Recliner sofa
RS23
4
1
Leather
Cream
Chair
CH10
1
1
Velvet
Red
Description
Price in $
1,200
175
(a) How many fields are in each record?
...............................................................................................................................................[1]
(b) State which field you would choose for the primary key.
...................................................................................................................................................
Give a reason for choosing this field.
...................................................................................................................................................
...............................................................................................................................................[2]
(c) State the data type you would choose for each of the following fields.
Number of Seats .....................................................................................................................
Price in $ ..............................................................................................................................[2]
© UCLES 2016
0478/22/M/J/16
.
211
84
(d) The query-by-example grid below selects all the furniture in cream leather.
Field: Description
Material
Colour
Price in $
Brochure Number
Table: SOFASELECT
SOFASELECT
SOFASELECT
SOFASELECT
SOFASELECT
Sort:
Descending

Show:
Criteria:

= ‘Leather’

= ‘Cream’
or:
Show the output from the query-by-example.
...................................................................................................................................................
...............................................................................................................................................[3]
(e) Complete the query-by-example grid below to select and show the brochure number, material,
colour and price of all the furniture with 3 or more seats.
Field:
Table:
Sort:
Show:
Criteria:
or:
[5]
© UCLES 2016
0478/22/M/J/16
.
285
Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
COMPUTER SCIENCE
0478/22
May/June 2016
Paper 2
MARK SCHEME
Maximum Mark: 50
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2016 series for most Cambridge IGCSE®,
Cambridge International A and AS Level components and some Cambridge O Level components.
® IGCSE is the registered trademark of Cambridge International Examinations.
This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
This document consists of 6 printed pages.
© UCLES 2016
[Turn over
.
Mark Scheme
286
Cambridge IGCSE – May/June 2016
Page 2
Syllabus
0478
Paper
22
Section A
1
(a) (i) Many correct answers, they must be meaningful. This is an example only.
– NumSacks, integer, number of sacks
– SacksAccepted, integer, number of sacks accepted
– TotalWeight, real, total weight of all sacks
[3]
(ii) Any three from
–
–
–
–
TopWeight, 50.1
BottomWeight 49.9
TopWeightCement 25.1
BottomWeightCement 24.9
[3]
(b) Any five from:
– initialise total weight of order
– input number of sacks for each type outside loop(s)
– loop for order completion
– input weight
inside loop(s)
– add weight of accepted sack to total weight
– output total weight
outside all loop(s)
– appropriate prompts for input number of sacks for each type and input weight
Max 5 marks
Sample Answer 1
INPUT 'Number of sand sacks ordered ' num_sand_ordered
INPUT 'Number of cement sacks ordered ' num_cement_ordered
INPUT 'Number of gravel sacks ordered ' num_gravel_ordered
total_weight ← 0
FOR Counter ← 1 TO num_sand_ordered
INPUT 'weight of sack of sand ' sack_weight
total_weight ← total_weight + sack_weight
NEXT Counter
FOR Counter ← 1 TO num_cement_ordered
INPUT 'weight of sack of cement ' sack_weight
total_weight ← total_weight + sack_weight
NEXT Counter
FOR Counter ← 1 TO num_gravel_ordered
INPUT 'weight of sack of gravel' sack_weight
total_weight ← total_weight + sack_weight
NEXT Counter
Print 'Total weight of sacks is ' total_weight
© Cambridge International Examinations 2016
[5]
.
Mark Scheme
287
Cambridge IGCSE – May/June 2016
Page 3
Syllabus
0478
Paper
22
Sample Answer 2
INPUT 'Number of sand sacks ordered ' num_sand_ordered
INPUT 'Number of cement sacks ordered ' num_cement_ordered
INPUT 'Number of gravel sacks ordered ' num_gravel_ordered
total_sacks_ordered ← num_sand_ordered + num_cement_ordered +
num_gravel_ordered
total_weight ← 0
FOR Counter ← 1 TO total_sacks_ordered
INPUT 'weight of sack ' sack_weight
total_weight ← total_weight + sack_weight
NEXT Counter
Print 'Total weight of sacks is ' total_weight
(c) (i) 1 mark for value reason, all values and reasons must be different. There are many
possible correct answers these are examples only.
Data value
Reason – normal data sand should be accepted
Data value
Reason – boundary data sand should be rejected
49.95
50.1
[2]
(ii)
Data value
Reason – normal data cement should be accepted
25
Data value
26.7
Reason – abnormal data cement that should be rejected
[2]
(d) Maximum 5 marks in total, maximum 3 marks if only programming statements used
Description (may include reference to program statements)
–
use of prices for calculation of regular price either numbers, variables or constants (sand
and gravel 2, cement 3)
–
description of calculation of regular price, multiply no of sand sacks by 2, multiply no of
gravel sacks by 2, multiply no of cement sacks by 3
–
output of regular price
–
description of calculating the number of special packs using the pack information (2
sacks of sand, 2 sacks of gravel and 1 sack of cement)
–
…….repeat until there are no more packs in the order (less than 2 sacks of sand or less
than 2 sacks of gravel or no sacks of cement
–
calculation of discount price and/or amount saved
–
output discount price and/or amount saved
© Cambridge International Examinations 2016
[5]
.
Mark Scheme
288
Cambridge IGCSE – May/June 2016
Page 4
Syllabus
0478
Paper
22
Section B
2
(i) 1 mark for each improvement
use FOR … NEXT instead of REPEAT … UNTIL
Move PRINT to after the end of the loop
Add error checking to check that the value input is positive
[3]
(ii) 3 marks maximum, 1 mark for each improvement correctly included.
Sample answer below
1 Total = 0
2
FOR Counter = 1 To 10
3
REPEAT
4
INPUT Num
5
UNTIL Num >0
6
Total = Total + Num
7 NEXT Counter
8 PRINT Total
[3]
3
Area
0
13.5
34.5
46.5
65
(2 marks)
1 mark 0, 13.5
1 mark for rest
Tins
0
Height
3
3
3
3
–1
7
(1 mark)
Width
5
7
5
7
0
Doors
1
0
0
1
0
(1 mark)
Windows
0
0
3
1
0
[4]
© Cambridge International Examinations 2016
.
Mark Scheme
289
Cambridge IGCSE – May/June 2016
Page 5
4
Syllabus
0478
Paper
22
1 mark for each correct line, maximum 3 (zero correct 0, one correct 1, two correct 2, three or
four correct 3), each box must have only one connection.
Statement type
example
Assignment
FOR X ← 1 TO 10
Iteration
READ X
Input
PRINT X
Output
X ← Y + Z
[3]
5
6
7
– data structure (one—dimensional) array ……….
– ……… reason to simplify programming/ make programs shorter, etc.
[2]
– IF (… THEN … ELSE … ENDIF)
– CASE (… OF … OTHERWISE … ENDCASE)
[2]
(a) – 7
[1]
(b) – Brochure Number……..
– ….. Uniquely identifies each record/each Brochure Number different/no duplicates
[2]
(c) – Number of Seats – number/integer
– Price in $ – currency/real
[2]
(d) 1 mark for each correct result, 1 mark for the results in descending order of price
– Recliner sofa 1,200 RS23
– Recliner chair 600
RC01
© Cambridge International Examinations 2016
[3]
.
Mark Scheme
290
Cambridge IGCSE – May/June 2016
Page 6
(e)
Syllabus
0478
Paper
22
Field:
Brochure
Number
Material
Colour
Price in $
Number of
Seats
Table:
SOFASELECT
SOFASELECT
SOFASELECT
SOFASELECT
SOFASELECT
Sort:
Show:
Criteria:
>2
or:
(1 mark)
(1 mark)
(1 mark)
(1 mark)
(1 mark)
[5]
© Cambridge International Examinations 2016
.
291
Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
0478/23
COMPUTER SCIENCE
Paper 2 Problem-solving and Programming
May/June 2016
PRE-RELEASE MATERIAL
No Additional Materials are required.
* 6 0 1 9 0 0 5 9 9 2 *
This material should be given to the relevant teachers and candidates as soon as it has been received
at the Centre.
READ THESE INSTRUCTIONS FIRST
Candidates should use this material in preparation for the examination. Candidates should attempt the
practical programming tasks using their chosen high-level, procedural programming language.
The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
This document consists of 2 printed pages.
DC (ST) 124079
© UCLES 2016
[Turn over
.
2
292
In preparation for the examination candidates should attempt the following practical tasks by writing
and testing a program(s).
The manager of a parcel delivery service needs a program to check the size and weight of parcels to
determine which parcels can be accepted for delivery.
Write and test a program for the manager.
•
•
•
Your program must include appropriate prompts for the entry of data.
Error messages and other output need to be set out clearly.
All variables, constants and other identifiers must have meaningful names.
You will need to complete these three tasks. Each task must be fully tested.
TASK 1 – Check the size and weight of a single parcel
Each parcel must obey the following rules to be accepted for delivery:
•
each dimension must be no more than 80 cm
•
the sum of the three dimensions must be no more than 200 cm
•
the weight of the parcel must be between one and ten kilograms inclusive
Input and store the weight and dimensions for one parcel. All the dimensions and the weight must be
validated on entry and an unsuitable parcel rejected.
Output if the parcel is accepted or rejected. If rejected, output all the reasons why the parcel was
rejected.
TASK 2 – Check a customer’s consignment of parcels
Input and store the number of parcels in the consignment. Calculate the number of parcels accepted
and the total weight of the parcels accepted. For each parcel that was rejected, output all the reasons
why that parcel was rejected.
Output the number of parcels accepted and the total weight of parcels accepted.
Output the number of parcels rejected.
TASK 3 – Calculate the price for a customer’s consignment of parcels
Extend TASK 2 to also calculate the price for each parcel, using the following rules:
•
1 kg to 5 kg inclusive costs $10
•
Each 100 grams over 5 kg, up to 10 kg, costs an extra $0.10
Your output should also include the price for each parcel accepted and the total price of the consignment.
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
© UCLES 2016
0478/23/M/J/16
.
293
Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
* 2 6 3 2 1 1 0 4 5 6 *
0478/23
COMPUTER SCIENCE
Paper 2 Problem-solving and Programming
May/June 2016
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
Answer all questions.
DO NOT ATTEMPT TASKS 1, 2 AND 3 in the pre-release material; these are for information only.
You are advised to spend no more than 40 minutes on Section A (Question 1).
No marks will be awarded for using brand names of software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The maximum number of marks is 50.
The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
This document consists of 11 printed pages and 1 blank page.
DC (LK/SW) 124305
© UCLES 2016
[Turn over
.
2
294
Section A
You are advised to spend no longer than 40 minutes answering this section.
Here is a copy of the pre-release material.
DO NOT attempt Tasks 1, 2 and 3 now.
Use the pre-release material and your experience from attempting the tasks before the examination to
answer Question 1.
Pre-release Material
The manager of a parcel delivery service needs a program to check the size and weight of parcels
to determine which parcels can be accepted for delivery.
Write and test a program for the manager.
•
•
•
Your program must include appropriate prompts for the entry of data.
Error messages and other output need to be set out clearly.
All variables, constants and other identifiers must have meaningful names.
You will need to complete these three tasks. Each task must be fully tested.
TASK 1 – Check the size and weight of a single parcel
Each parcel must obey the following rules to be accepted for delivery:
•
each dimension must be no more than 80 cm
•
the sum of the three dimensions must be no more than 200 cm
•
the weight of the parcel must be between one and ten kilograms inclusive
Input and store the weight and dimensions for one parcel. All the dimensions and the weight must
be validated on entry and an unsuitable parcel rejected.
Output if the parcel is accepted or rejected. If rejected, output all the reasons why the parcel was
rejected.
TASK 2 – Check a customer’s consignment of parcels
Input and store the number of parcels in the consignment. Calculate the number of parcels accepted
and the total weight of the parcels accepted. For each parcel that was rejected, output all the
reasons why that parcel was rejected.
Output the number of parcels accepted and the total weight of parcels accepted.
Output the number of parcels rejected.
TASK 3 – Calculate the price for a customer’s consignment of parcels
Extend TASK 2 to also calculate the price for each parcel, using the following rules:
•
1 kg to 5 kg inclusive costs $10
•
Each 100 grams over 5 kg, up to 10 kg, costs an extra $0.10
Your output should also include the price for each parcel accepted and the total price of the
consignment.
© UCLES 2016
0478/23/M/J/16
.
3
295
1
(a) All variables, constants and other identifiers should have meaningful names.
(i)
For each of the variables that you have used to record dimensions of the parcels in Task 1,
state the name, type and its use.
Variable 1 name .................................................................................................................
Type ....................................................................................................................................
Use .....................................................................................................................................
Variable 2 name .................................................................................................................
Type ....................................................................................................................................
Use .....................................................................................................................................
Variable 3 name .................................................................................................................
Type ....................................................................................................................................
Use .................................................................................................................................[3]
(ii)
State two constants that you could have used for Task 1. Give the value that would be
assigned to each one.
Constant 1 name ................................................................................................................
Value 1 ...............................................................................................................................
Constant 2 name ................................................................................................................
Value 2 ...........................................................................................................................[2]
© UCLES 2016
0478/23/M/J/16
[Turn over
.
4
296
(b) Write an algorithm to complete Task 1, using either pseudocode, programming statements
or a flowchart.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
..................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
© UCLES 2016
0478/23/M/J/16
.
5
297
(c) Give three different data sets that could be used to check your validation rules for Task 1.
Explain why you chose each data set.
Data set 1 ..................................................................................................................................
Reason for choice ......................................................................................................................
...................................................................................................................................................
Data set 2 ..................................................................................................................................
Reason for choice ......................................................................................................................
...................................................................................................................................................
Data set 3 ..................................................................................................................................
Reason for choice ......................................................................................................................
...............................................................................................................................................[6]
(d) Explain how your program calculates the price for a consignment (part of Task 3). You may
include programming statements as part of your explanation.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
© UCLES 2016
0478/23/M/J/16
[Turn over
.
6
298
Section B
2
Read this section of program code that inputs 10 positive numbers and then outputs the smallest
number input.
1
2
3
4
5
6
7
8
Small = 1000
Counter = 0
REPEAT
INPUT Num
IF Num < Small THEN Small = Num
Counter = Counter + 1
UNTIL Counter = 10
PRINT Small
(i)
Identify three changes you would need to make to find the largest number input instead
of the smallest number.
1 .........................................................................................................................................
...........................................................................................................................................
2 .........................................................................................................................................
...........................................................................................................................................
3 .........................................................................................................................................
.......................................................................................................................................[3]
(ii)
Rewrite the program code with your changes.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[3]
© UCLES 2016
0478/23/M/J/16
.
7
299
3
A program will be written to store information about members of a swimming club.
The following membership details will be recorded:
•
Name
•
Gender
•
Status:
•
Senior
•
Junior
•
Fee
•
Team member (Yes or No)
(i)
Choose a suitable data type for each of the membership details to be recorded.
Membership details
Data type
Name
Gender
Status
Fee
Team member
[5]
(ii)
The swimming club has 50 members.
State the data structure that would be most suitable to use and give a reason for your
choice.
Data structure.....................................................................................................................
Reason ...............................................................................................................................
.......................................................................................................................................[2]
© UCLES 2016
0478/23/M/J/16
[Turn over
.
8
300
4
The flowchart below inputs the height of children who want to ride on a rollercoaster. Children
under 1.2 metres are rejected. The ride starts when eight children have been accepted.
67$57
5LGHUV
5HMHFW
,1387
+HLJKW
,V
+HLJKW
"
<HV
5HMHFW5HMHFW
1R
5LGHUV5LGHUV
1R
5LGHUV
"
<HV
287387
5HDG\WRJR 5HMHFW
(1'
© UCLES 2016
0478/23/M/J/16
.
9
301
Complete the trace table for the input data:
1.4, 1.3, 1.1, 1.3, 1.0, 1.5, 1.2, 1.3, 1.4, 1.3, 0.9, 1.5, 1.6, 1.0
Riders
Reject
Height
OUTPUT
[4]
© UCLES 2016
0478/23/M/J/16
[Turn over
.
310
02
5
REPEAT ... UNTIL is one type of loop structure.
Identify and describe two other types of loop structure that you could use when writing
pseudocode.
Loop structure 1 .........................................................................................................................
Description .................................................................................................................................
...................................................................................................................................................
Loop structure 2 .........................................................................................................................
Description .................................................................................................................................
...............................................................................................................................................[4]
© UCLES 2016
0478/23/M/J/16
.
311
03
6
A database, STAFFPHONE, was set up to show the telephone extension numbers for members of
staff working in a department store.
Name
Department
Extension number
Jane Smith
Toys
129
Sue Wong
Books
124
Toys
129
Amy Tang
Household
123
Joe Higgs
Books
124
Jane Smith
Shoes
125
Adel Abur
Shoes
125
Peter Patel
Toys
129
David Chow
(a) Explain why none of the fields in the database can be used as a primary key.
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) State a field that could be added as a primary key.
...................................................................................................................................................
Give a reason for choosing this field.
...................................................................................................................................................
...............................................................................................................................................[2]
(c) Use the query-by-example grid below to provide a list of all members of staff, in alphabetical
order, grouped by department.
Field:
Table:
Sort:
Show:
Criteria:
or:
[5]
© UCLES 2016
0478/23/M/J/16
.
304
Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
COMPUTER SCIENCE
0478/23
May/June 2016
Paper 2
MARK SCHEME
Maximum Mark: 50
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2016 series for most Cambridge IGCSE®,
Cambridge International A and AS Level components and some Cambridge O Level components.
® IGCSE is the registered trademark of Cambridge International Examinations.
This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
This document consists of 6 printed pages.
© UCLES 2016
[Turn over
.
Mark Scheme
305
Cambridge IGCSE – May/June 2016
Page 2
Syllabus
0478
Paper
23
Section A
1
(a) (i) Many correct answers, names must be meaningful. This is an example only.
Length, real/integer, length of parcel
Breadth, real/integer, breadth of parcel
Height, real/integer, Height of parcel
[3]
(ii) Several correct answers, they must be meaningful. These are examples only.
Dimension, 80
TotalDimension 200
MaxWeight 10.00
[2]
(b) Any 5 from:
– input length, breadth, height and weight
– check each dimension, not more than 80
– check total of dimensions, not more than 200
– check weight at least 1
– check weight not more than 10
– output parcel accepted (must be in appropriate position)
– output parcel rejected (must be in appropriate position)
– output all reasons for rejecting parcel (reason must follow test)
Max 5 marks
Sample Answer.
INPUT Length, Breadth, Height, Weight
IF Length <= 80 AND Breadth <= 80 AND Height <= 80 AND Weight >= 1
AND Weight <=10 AND Length + Breadth + Height <= 200 THEN
PRINT 'Parcel accepted'
ELSE
PRINT 'Parcel rejected'
IF Length > 80 OR Breadth > 80 OR Height > 80 THEN
PRINT 'At least one dimension too large'
ENDIF
IF Weight < 1 THEN
PRINT 'Parcel too light'
ENDIF
IF Weight > 10 THEN
PRINT 'Parcel too heavy'
ENDIF
ENDIF
© Cambridge International Examinations 2016
[5]
Page 3
.
Mark Scheme
306
Cambridge IGCSE – May/June 2016
Syllabus
0478
Paper
23
(c) 1 mark for the data set and 1 mark for the matching reason all, data sets and reasons must
be different. There are many possible correct answers these are examples only.
Data set 30, 29, 28, 4
Reason – normal data; parcel should be accepted
Data set 80, 60, 60, 10
Reason – boundary data; parcel should be accepted
Data set – 85, 60, 60, 11
Reason – abnormal data; parcel should be rejected
[6]
(d) Maximum 4 marks in total, maximum 2 marks if only programming statements used.
Explanation (may include reference to programming statements)
– loop for number of parcels
– parcels 5 kg or less use standard price
– over 5 kg use weight to calculate price
– Correct calculation of price
– keep running total of consignment price
© Cambridge International Examinations 2016
[4]
.
Mark Scheme
307
Cambridge IGCSE – May/June 2016
Page 4
Syllabus
0478
Paper
23
Section B
2
(i) 1 mark for each change
Change variable name in every instance as needs to be meaningful e.g. Large
Set this variable to a low value
line 5: change comparison from < to >
[3]
(ii) 3 marks maximum, 1 mark for each change correctly included.
1
2
3
4
5
6
7
8
Large = 0
Counter = 0
REPEAT
INPUT Num
IF Num > Large THEN Large = Num
Counter = Counter + 1
UNTIL Counter = 10
PRINT Large
[3]
3
(i) Name type – string
Gender type – char/string
Status type – char/string
Fee type – real
Team member type – Boolean
[5]
(ii) Data Structure – several Arrays ……
………….Reason – to simplify programming/ make programs shorter/index can be used
to identify the same member across the arrays etc.
[2]
© Cambridge International Examinations 2016
.
Mark Scheme
308
Cambridge IGCSE – May/June 2016
Page 5
4
Riders
Reject
0
0
Height
1
1.4
2
1.3
1
Syllabus
0478
Paper
23
Output
1.1
3
1.3
2
1.0
4
1.5
5
1.2
6
1.3
7
1.4
8
1.3
Ready to go 2
(1 mark)
(1 mark)
(1 mark)
(1 mark)
[4]
5
– FOR (… TO … NEXT)…
– … a set number of iterations
– WHILE (… DO … ENDWHILE) …
– … used where the loop may never be executed/whilst a specified condition exists
[4]
6
(a) – all (fields) have (1 mark) duplicate entries (1 mark)
– none (of the fields) (1 mark) have unique entries(1 mark)
[2]
(b) – e.g. StaffNumber ….
– ….. Uniquely identifies each member of staff//no duplicates//different for each member of
staff
[2]
© Cambridge International Examinations 2016
.
Mark Scheme
309
Cambridge IGCSE – May/June 2016
Page 6
(c)
Field:
Department
Name
Table:
STAFFPHONE
STAFFPHONE
Sort:
Ascending
Ascending
Show:
(2 marks)
(2 marks)
Syllabus
0478
Paper
23
Criteri
a:
or:
(1 mark for correct order and number of fields shown)
[5]
© Cambridge International Examinations 2016
.
310
Cambridge International Examinations
Cambridge Ordinary Level
* 0 7 4 3 5 8 5 6 7 6 *
2210/12
COMPUTER SCIENCE
Paper 1 Theory
October/November 2016
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
Answer all questions.
No marks will be awarded for using brand names of software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The maximum number of marks is 75.
This document consists of 12 printed pages.
DC (AL) 135539
© UCLES 2016
[Turn over
.
2
311
1
(a) Give two reasons why a programmer would choose to write code in a low-level language.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
(b) High-level languages require either an interpreter or a compiler to translate the program.
The table below lists a number of statements about language translators.
Tick (3) to show which statements refer to interpreters and which refer to compilers.
Statements
Interpreter (3)
Compiler (3)
Translates the source code into machine code
all at once
Produces an executable file in machine code
Executes a high-level language program one
instruction at a time
Once translated, the translator does not need to
be present for the program to run
An executable file is produced
[5]
2
State four functions of an operating system.
1 .......................................................................................................................................................
2 .......................................................................................................................................................
3 .......................................................................................................................................................
4 .......................................................................................................................................................
[4]
© UCLES 2016
2210/12/O/N/16
.
3
312
3
(a) Explain what is meant by:
(i)
Serial data transmission
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(ii)
Parallel data transmission
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(b) A computer in a factory is connected to a printer. The printer is located in an office 1 km away
from the factory.
Identify which data transmission method would be most suitable for this connection.
...................................................................................................................................................
Give two reasons for your choice.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
© UCLES 2016
2210/12/O/N/16
[Turn over
.
4
313
4
Nine bytes of data are transmitted from one computer to another. Even parity is used. An additional
parity byte is also sent.
The ten bytes arrive at the destination computer as follows:
parity bit
bit 2
bit 3
bit 4
bit 5
bit 6
bit 7
bit 8
byte 1
1
1
1
0
1
1
1
0
byte 2
0
0
0
0
0
1
0
1
byte 3
0
1
1
1
1
0
0
0
byte 4
1
1
0
0
0
0
0
0
byte 5
1
0
1
1
1
1
1
0
byte 6
0
1
0
1
1
0
0
1
byte 7
0
1
1
1
0
0
1
1
byte 8
0
0
1
1
0
1
1
0
byte 9
1
1
0
0
0
0
1
1
parity byte
0
0
1
0
0
0
1
0
One of the bits was corrupted during the data transmission.
(a) Circle the corrupt bit in the corrupt byte in the table above.
[1]
(b) Explain how the corrupted bit was found.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
© UCLES 2016
2210/12/O/N/16
.
5
314
5
A computer uses an 8-bit register.
The 8-bit register contains binary integers.
(a) Write the denary (base 10) value represented by:
128
64
32
16
8
4
2
1
0
1
1
1
0
0
0
0
...............................................................................................................................................[1]
(b) All the bits in the register are shifted one place to the right as shown below.
0
1
1
1
0
0
0
0
0
0
1
1
1
0
0
0
Write the denary number that is represented after this shift.
...............................................................................................................................................[1]
(c) State the effect the shift to the right had on the original denary number from part (a).
...............................................................................................................................................[1]
(d) The original number in part (a) is shifted three places to the right.
(i)
Show the new binary number:
[1]
(ii)
Write the equivalent denary number.
.......................................................................................................................................[1]
© UCLES 2016
2210/12/O/N/16
[Turn over
.
6
315
(e) Describe the problems that could be caused if the original binary number in part (a) is shifted
five places to the right.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
6
Four computer terms and eight descriptions are shown below.
Draw lines to connect each computer term to the correct description(s).
Computer term
Description
Data can be read but not altered
Arithmetic and logic
unit (ALU)
Carries out operations such as
addition and multiplication
Stores bootstrap loader and BIOS
Control unit
Fetches each instruction in turn
Carries out operations such as
AND, OR, NOT
Random access
memory (RAM)
Stores part of the operating system
currently in use
Read only memory
(ROM)
Stores data currently in use
Manages execution of each
instruction
[4]
© UCLES 2016
2210/12/O/N/16
.
7
316
7
(a) Complete the truth tables and name the single logic gate that could replace each logic circuit:
(i)
A
A
B
0
0
0
1
1
0
1
1
Working space
X
X
B
Single logic gate ............................................................................................................[3]
(ii)
A
X
B
A
B
0
0
0
1
1
0
1
1
Working space
X
Single logic gate ............................................................................................................[3]
© UCLES 2016
2210/12/O/N/16
[Turn over
.
8
317
(b) (i)
Draw a logic circuit to represent the following logic statement:
X = 1 if (A = 1 AND B = 1) OR ( (B = NOT 1) AND C = 1)
A
B
X
C
[4]
(ii)
Complete the truth table for the logic statement in part (b)(i).
A
B
C
0
0
0
0
0
1
0
1
0
0
1
1
1
0
0
1
0
1
1
1
0
1
1
1
Working space
X
[4]
© UCLES 2016
2210/12/O/N/16
.
9
318
8
Identify whether the four statements about file compression are correct by writing TRUE or FALSE
in the following table.
Statement
TRUE or FALSE
MIDI files store the actual music notes in a compressed format
JPEG files are examples of lossless file compression
MP3 files are, on average, 90% smaller than the music files
stored on a CD
MP4 files are examples of lossy file compression
[4]
9
(a) Explain what is meant by a denial of service attack.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) Name and describe two other potential security threats when using the Internet.
Security threat 1 .......................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Security threat 2 .......................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
© UCLES 2016
2210/12/O/N/16
[Turn over
.
310
19
10 (a) Describe what is meant by HTML.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(b) The following URL is typed in:
http://www.cie.org.uk/ComputerSciencePapers
This URL is composed of three parts.
State the part of this URL that is the:
File name ..................................................................................................................................
Protocol ....................................................................................................................................
Web server name .....................................................................................................................
[3]
© UCLES 2016
2210/12/O/N/16
.
311
20
11
A security system is installed in a house. A hexadecimal number is entered to activate or deactivate
the alarm.
(a) The alarm code is set to hexadecimal number 2 A F
Show how this number would be stored in a 12-bit binary register.
[3]
(b) Identify two sensors that the security system could use to detect intruders.
Describe how each sensor could be used in the security system.
Sensor 1 ...................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Sensor 2 ...................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
© UCLES 2016
2210/12/O/N/16
[Turn over
.
312
21
12 Explain the differences between freeware and free software.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
© UCLES 2016
2210/12/O/N/16
.
322
Cambridge International Examinations
Cambridge Ordinary Level
COMPUTER SCIENCE
2210/12
Paper 1
October/November 2016
MARK SCHEME
Maximum Mark: 75
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the October/November 2016 series for most
®
Cambridge IGCSE , Cambridge International A and AS Level components and some Cambridge O Level
components.
® IGCSE is the registered trademark of Cambridge International Examinations.
This document consists of 10 printed pages.
© UCLES 2016
[Turn over
1
.
Mark Scheme
323
Cambridge O Level – October/November 2016
Page 2
(a) Any two from:
–
–
–
Syllabus
2210
Paper
12
direct access to computer processor / special hardware // machine dependent
instructions
uses up less memory
can increase the speed of processing a program // executes instructions faster
[2]
(b)
Interpreter (9)
Statements
Compiler (9)
Translates the source code into machine code
all at once
9
Produces an executable file in machine code
9
Executes a high-level language program one
instruction at a time
9
Once translated, the translator does not need to be
present for the program to run
9
An executable file is produced
9
[5]
2
Any four from:
–
–
–
–
–
–
–
–
–
–
–
–
Provides a user interface
Handles interrupts / errors
Memory management
File management
Manages peripherals (inputs/outputs)
Provides security methods
Allows multitasking
Manages multiprogramming
Enables batch processing
Manages software installation / removal
Allows creation of multiple accounts
Levels of access
[4]
© UCLES 2016
3
.
Mark Scheme
324
Cambridge O Level – October/November 2016
Page 3
(a) (i) Any two from:
Syllabus
2210
Paper
12
serial
–
–
–
one bit sent at a time // bits sent sequentially
over a single wire
synchronous or asynchronous
[2]
(ii) Any two from:
parallel
–
–
–
several bits / a byte sent at a time
using many / multiple wires
synchronous
[2]
(b)
–
serial
Any two from:
–
–
–
–
–
serial data transmission more reliable over long distances
less likely for the data to be skewed/out of synchronisation
less interference as only a single wire
it is a cheaper connection as only single wire needed // cheaper to set up
a fast connection is not required as a printer is limited by its printing speed
[3]
4
(a) Intersection of Row 7 and column 4 circled
(b) –
–
[1]
Row (byte number) 7 has an odd number of 1s (five 1s)
Column (bit number) 4 has an odd number of 1s (five 1s)
[2]
© UCLES 2016
.
Mark Scheme
325
Cambridge O Level – October/November 2016
Page 4
5
(a) 112
Syllabus
2210
Paper
12
[1]
(b) 56
[1]
(c) divided by 2 // value 112 was halved // multiplied by 0.5
[1]
(d) (i)
0
0
0
0
1
1
1
0
[1]
(ii) 14
[1]
(e) Any two from:
–
–
–
–
run out of places to the right of register / at the end of register
right-most 1 would be lost
number would become 3 instead of 3.5
loss of precision
[2]
© UCLES 2016
Page 5
6
.
Mark Scheme
326
Cambridge O Level – October/November 2016
Syllabus
2210
Paper
12
1 mark for both correct lines from each computer term.
[4]
© UCLES 2016
Page 6
7
.
Mark Scheme
327
Cambridge O Level – October/November 2016
(a) (i) 2 marks for 4 correct outputs,
1 mark for 2 correct outputs
Syllabus
2210
Paper
12
1 mark for correct gate
A
B
Working space
X
0
0
0
0
1
0
1
0
0
1
1
1
AND gate
[3]
(ii) 2 marks for 4 correct outputs
1 mark for 2 correct outputs
1 mark for correct gate
A
B
Working space
X
0
0
0
0
1
1
1
0
1
1
1
1
OR gate
[3]
© UCLES 2016
Page 7
.
Mark Scheme
328
Cambridge O Level – October/November 2016
(b)(i) 1 mark per correct section.
Syllabus
2210
Paper
12
1 mark
1 mark
1 mark
1 mark
[4]
(ii) 4 marks for 8 correct outputs
3 marks for 6 correct outputs
2 marks for 4 correct outputs
1 mark for 2 correct outputs
A
B
C
Working space
X
0
0
0
0
0
0
1
1
0
1
0
0
0
1
1
0
1
0
0
0
1
0
1
1
1
1
0
1
1
1
1
1
[4]
© UCLES 2016
.
Mark Scheme
329
Cambridge O Level – October/November 2016
Page 8
8
Statement
Syllabus
2210
Paper
12
TRUE or FALSE
MIDI stores the actual music notes in a compressed format
FALSE
JPEG files are examples of lossless file compression
FALSE
MP3 files are, on average, 90% smaller than the music files
stored on a CD
TRUE
MP4 files are examples of lossy file compression
TRUE
[4]
9
(a) Any two from:
–
–
–
–
a large number of requests are sent to the network/server all at once
designed to flood a network/server with useless traffic/requests
the network/server will come to a halt/stop trying to deal with all the traffic/requests
prevents users from gaining access to a website/server
[2]
(b) 1 mark for each security threat and 1 mark for matching description
Security threat
Description
Viruses
– software that replicates
– causes loss/corruption of data // computer may “crash”/run
slow
Hacking/cracking
– illegal/ unauthorised access to a system/data
Phishing
– a link/attachment sends user to fake website (where personal
data may be obtained)
Pharming
– malicious code installed on user’s hard drive / computer
– user is redirected to a fake website (where personal data may
be obtained)
Spyware/key logger
– send/relay key strokes to a third party
[4]
© UCLES 2016
.
Mark Scheme
330
Cambridge O Level – October/November 2016
Page 9
10 (a) Any three from:
–
–
–
–
Syllabus
2210
Paper
12
hyper text mark-up language
uses both structure and presentation
web-authoring language/software // used to create websites/webpages
uses tags to define e.g. colour / font / graphics / layout
[3]
(b)
File name:
ComputerSciencePapers
Protocol:
http(://)
Web server name:
www.cie.org.uk
[3]
11 (a) 1 mark per nibble
0010
1010
1111
[3]
(b) 1 mark for identification of each sensor, max 2 for each description
Infrared/motion sensor
–
–
–
–
–
Receives infrared rays/heat
Sends data to microprocessor
Receives microwaves
Placed in the corner of a room, across a doorway
Used to detect the heat of an intruder // used to detect if an infrared beam has been
broken by an intruder
Pressure sensor
–
–
–
–
Receives current if circuit created // stops receiving current if circuit is broken
Sends data to microprocessor
Placed on a window/door, at the entrance
Used to detect a change in pressure
[6]
© UCLES 2016
Page 10
12 Any four from:
–
–
–
–
–
.
Mark Scheme
331
Cambridge O Level – October/November 2016
Syllabus
2210
Paper
12
Freeware needs owner’s permission to share/copy/amend whereas free software can be
shared/copied/amended without permission
Freeware the owner retains copyright / is subject to copyright whereas free software the
owner releases copyright/ is not subject to copyright
Freeware is normally provided without a fee whereas free software a fee may be charged
Freeware is distributed without the source code whereas free software is distributed with the
source code
Freeware can be restricted in use e.g. non-commercial whereas free software can be used
without restriction
NOTE: The question asks candidates to explain the differences, so each mark needs to have a
comparison.
[4]
© UCLES 2016
.
332
Cambridge International Examinations
Cambridge Ordinary Level
* 2 2 0 3 8 2 8 9 7 8 *
2210/13
COMPUTER SCIENCE
Paper 1 Theory
October/November 2016
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
Answer all questions.
No marks will be awarded for using brand names of software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The maximum number of marks is 75.
This document consists of 14 printed pages and 2 blank pages.
DC (SLM) 135989
© UCLES 2016
[Turn over
.
2
333
1
To process an instruction, a central processing unit (CPU) goes through a cycle that has three
main stages.
Name each stage in this cycle.
Stage 1 ................................................................................
Stage 2 ................................................................................
Stage 3 ................................................................................
[3]
2
Name each of the potential security issues described in the five statements below:
Statement
Security issue
The act of gaining unauthorised access to
a computer system
..................................................................................
Program code that can replicate itself with
the intention of deleting or corrupting files
stored in a computer
..................................................................................
A small file sent by a web server to a web
browser; every time the user visits the
website, data about user preferences is
collected
..................................................................................
The act of illegally changing the source
code of a program so that it can be
exploited for another use
..................................................................................
Malicious code installed on a user’s hard
drive or a web server which redirects
the user to a fake website without their
knowledge
..................................................................................
[5]
© UCLES 2016
2210/13/O/N/16
.
3
334
3
Five computer terms and seven descriptions are shown below.
Draw a line to connect each computer term to its correct description.
Computer term
Description
Several bits of data sent down several
wires, in both directions, but not at the
same time
Serial, simplex data
transmission
Several bits of data sent down several
wires, in both directions, at the same
time
Parallel, half-duplex
data transmission
Parity check
An even or odd number of bits set to 1
in a byte, used to check if the byte has
been transmitted correctly
One bit sent at a time, over a single wire
in one direction only
An additional digit placed at the end of a
number to check if the number has been
entered correctly
Automatic repeat
request (ARQ)
A value transmitted at the end of a block
of data; it is calculated using the other
elements in the data stream and is used
to check for transmission errors
Checksum
© UCLES 2016
An error detection method that uses
response and time out when transmitting
data; if a response is not sent back to
the sender in an agreed amount of time,
then the data is re-sent
2210/13/O/N/16
[5]
[Turn over
.
4
335
4
The Henslows Diner is a local restaurant.
(a) Staff currently use a keyboard to input a customer food order into a computer. The food order
is then sent to the kitchen.
State two disadvantages of using a keyboard to input a customer food order.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(b) A concept keyboard has a flat surface that is overlaid with images of food items available
from the restaurant menu. Staff can click on an image to add the food item to a customer food
order.
The Henslows Diner wants to change to a concept keyboard to input customer food orders.
Explain two benefits of making this change.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
© UCLES 2016
2210/13/O/N/16
.
5
336
(c) The Henslows Diner stores personal data on a computer. This computer is connected to the
Internet to allow the data to be backed up.
There is currently one security method in place to protect the data on the computer from
unauthorised access. This is a password.
Give two other security methods that could be added to improve the security of the data.
Describe how each method will keep the data safe.
Security method 1 .....................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Security method 2 .....................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
© UCLES 2016
2210/13/O/N/16
[Turn over
.
6
337
5
Three switches, A, B and C, each send values of 0 or 1 to a logic circuit. Value X is output from the
logic circuit.
Switch A
Switch B
Logic circuit
Output X
Switch C
Output X has a value of 1 depending on the following conditions:
Switch A sends value 1 AND Switch B sends value 0
OR
Switch B sends value 1 AND Switch C sends value 0
(a) Draw a logic circuit to represent the conditions above.
A
B
X
C
[5]
© UCLES 2016
2210/13/O/N/16
.
7
338
(b) Complete the truth table for the conditions given at the start of question 5.
Working space
A
B
C
0
0
0
0
0
1
0
1
0
0
1
1
1
0
0
1
0
1
1
1
0
1
1
1
X
[4]
(c) A microprocessor regularly samples the output, X. Each sample value is stored in an 8-bit
register as shown below. One bit of this register is reserved as a parity bit.
Five consecutive output values of 1 indicate a fault condition.
Identify which of the following registers shows a fault condition.
Parity bit
1
1
1
1
1
0
0
1
Register Y
0
1
0
1
1
1
1
1
Register Z
Register .............................................[1]
© UCLES 2016
2210/13/O/N/16
[Turn over
.
8
339
(d) When eight bytes of data have been collected, they are transmitted to a computer 100 km
away. Parity checks are carried out to identify if the data has been transmitted correctly. The
system uses even parity and column 1 is the parity bit.
The eight bytes of data are sent together with a ninth parity byte:
parity
bit
column
2
column
3
column
4
column
5
column
6
column
7
column
8
byte 1
1
0
0
0
0
1
0
0
byte 2
1
1
1
1
0
0
1
1
byte 3
0
1
0
0
1
0
0
0
byte 4
0
1
1
1
0
0
0
1
byte 5
1
0
0
0
1
1
1
1
byte 6
0
0
0
0
0
0
0
0
byte 7
1
1
1
0
1
0
0
0
byte 8
1
0
0
0
1
1
1
0
parity
byte
1
0
1
1
0
1
1
1
(i)
Identify which of the eight bytes contains an error.
byte ...............................................................................................................................[1]
(ii)
Identify which column contains an error.
column ...........................................................................................................................[1]
(iii)
The incorrect bit is indicated where the byte number and column cross.
Give the corrected byte.
[1]
(iv)
Calculate the denary value of the corrected byte.
...........................................................................................................................................
.......................................................................................................................................[1]
(v)
Considering the fault condition given in part (c), explain why it is very important that the
incorrect bit is located and corrected.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
© UCLES 2016
2210/13/O/N/16
.
9
340
6
High-level or low-level languages can be used when writing a computer program.
State two advantages of using a high-level language and two advantages of using a low-level
language.
High-level language advantage 1 ....................................................................................................
..........................................................................................................................................................
High-level language advantage 2 ....................................................................................................
..........................................................................................................................................................
Low-level language advantage 1 .....................................................................................................
..........................................................................................................................................................
Low-level language advantage 2 .....................................................................................................
..........................................................................................................................................................
[4]
7
Modern Liquid Crystal Display (LCD) monitors use Light-Emitting Diode (LED) backlit technology.
Give four benefits of using LED technology.
1 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
4 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[4]
© UCLES 2016
2210/13/O/N/16
[Turn over
.
310
41
8
Four descriptions about compilers and interpreters are shown below.
Draw lines to indicate which descriptions refer to a compiler and which descriptions refer to an
interpreter.
Description
It is more difficult to debug the
code since one error can
produce many other associated
errors.
The speed of execution of
program loops is slower.
Compiler
It produces fast, executable
code that runs directly on the
processor.
Interpreter
It is easier to debug the code
since an error is displayed as
soon as it is found.
[4]
© UCLES 2016
2210/13/O/N/16
.
311
42
9
A security light is controlled by sensors and a microprocessor.
Describe how the sensors and microprocessor interact to switch on the security light when an
intruder is detected.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
© UCLES 2016
2210/13/O/N/16
[Turn over
.
312
43
10 (a) A manufacturer of aeroplane engines assigns a denary identification number (ID) to each
engine.
One engine has the ID:
(i)
0431
Convert this denary number to a 12-bit binary format.
[2]
(ii)
Show how this number would be represented in hexadecimal.
...........................................................................................................................................
...........................................................................................................................................
[3]
(b) The current status of the engine is sent to a computer in the aeroplane.
Each piece of data collected is 8 bytes in size. Data collection occurs every 30 seconds.
Calculate the number of kilobytes that would be needed to store the data collected during a
10-hour flight. Show your working.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
................................................. kilobytes
[3]
© UCLES 2016
2210/13/O/N/16
.
313
44
(c) At the end of the flight, all of the data are sent to the aeroplane engine manufacturer using the
Internet.
The computer in the aeroplane has a MAC address and an IP address.
State what is meant by these two terms.
MAC address ............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
IP address .................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
(d) When sending this data, security is very important. Data are sent over the Internet using
Transport Layer Security (TLS) protocol.
Name the two layers that make up TLS.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
© UCLES 2016
2210/13/O/N/16
[Turn over
.
314
45
11
Explain why ethics are important when using computers.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
© UCLES 2016
2210/13/O/N/16
.
346
Cambridge International Examinations
Cambridge Ordinary Level
COMPUTER SCIENCE
2210/13
October/November 2016
Paper 1
MARK SCHEME
Maximum Mark: 75
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the October/November 2016 series for most
®
Cambridge IGCSE , Cambridge International A and AS Level components and some Cambridge O Level
components.
® IGCSE is the registered trademark of Cambridge International Examinations.
This document consists of 9 printed pages.
© UCLES 2016
[Turn over
Page 2
1
2
In any order:
– Fetch
– Decode
– Execute
–
–
–
–
–
.
Mark Scheme
347
Cambridge O Level – October/November 2016
Syllabus
2210
Paper
13
[3]
Hacking
Virus
Cookies
Cracking
Pharming
[5]
© UCLES 2016
Page 3
3
.
Mark Scheme
348
Cambridge O Level – October/November 2016
Syllabus
2210
Paper
13
[5]
© UCLES 2016
Page 4
4
.
Mark Scheme
349
Cambridge O Level – October/November 2016
(a) Any two from:
–
–
–
Syllabus
2210
Paper
13
Easy to make a mistake
Can be slow if not trained
Dirt/food can get into keys
[2]
(b) Any two with identification and explanation from:
–
–
–
–
–
–
–
–
Fewer typing errors may be made …
… because one button is pressed to order an item
Speed up the time to enter an order …
… because fewer buttons are pressed to complete the order
May require less training …
… because it is easier to identify an order item from its image rather than typing it
Can stop dirt/food damage …
… normally has a protective layer // because there are no keys for dirt/food to get into
[4]
(c) 1 mark for security measure, 1 mark for description.
Any two from:
–
–
Encryption
If the data is accessed or stolen it will be meaningless
–
–
Biometric device
Can help prevents unauthorised access to the system (only award once)
–
–
–
–
Firewall
Can alert to show unauthorised access attempt on the system
Can help prevent unauthorised access to the system (only award once)
Can help protect against viruses and malware entering the system
–
–
Anti-spyware
Can stop the keys being logged that, when analysed, would reveal the password to
the data
© UCLES 2016
[4]
Page 5
5
.
Mark Scheme
350
Cambridge O Level – October/November 2016
(a) 1 mark per correct section.
Syllabus
2210
Paper
13
A
X
B
C
[5]
(b) 4 marks for 8 correct values
3 marks for 6 correct values
2 marks for 4 correct values
1 mark for 2 correct values
A
B
C
0
0
0
0
0
0
1
0
0
1
0
1
0
1
1
0
1
0
0
1
1
0
1
1
1
1
0
1
1
1
1
0
Working space
X
[4]
© UCLES 2016
Page 6
.
Mark Scheme
351
Cambridge O Level – October/November 2016
(c) Register Z
Syllabus
2210
(d) (i) (byte) 5
Paper
13
[1]
[1]
(ii) (column) 4
[1]
(iii) corrected byte is: 1 0 0 1 1 1 1 1
[1]
(iv) that gives the value: 1 5 9
(follow through applies)
[1]
(v) Any two from:
–
–
6
The byte would be transmitted without having 5 consecutive 1’s
The fault condition would not be recognised
[2]
Any two from:
High level language
–
–
–
–
easier/faster to write code as uses English-like statements
easier to modify as uses English-like statements
easier to debug as uses English-like statements
portable language code
Any two from:
Low level language
–
–
–
7
can work directly on memory locations
can be executed faster
translated program requires less memory
[4]
Any four from:
–
–
–
–
–
–
reaches maximum brightness quickly
colours are vivid
good colour definition/contrast can be achieved
screens can be thinner/thin
more reliable as LED’s are long lasting
consume very little/less energy
© UCLES 2016
[4]
Page 7
.
Mark Scheme
352
Cambridge O Level – October/November 2016
8
Syllabus
2210
Paper
13
It is more difficult to debug the
code since one error can
produce many other
associated errors
The speed of execution of
program loops is slower.
Compiler
It produces fast, executable
code that runs directly on the
processor
Interpreter
It is easier to debug the code
since an error is displayed as
soon as it is found.
[4]
© UCLES 2016
.
Page 8
9
Mark Scheme
353
Cambridge O Level – October/November 2016
Any six from:
–
–
–
–
–
–
–
–
–
–
–
–
Syllabus
2210
Paper
13
infrared / motion / pressure (sensor) // sensor detects movement/pressure
signals/data sent (continuously) to microprocessor
converted from analogue to digital (using ADC)
microprocessor compares value with those stored in memory
if sensor value does not match the stored value(s) …
… signal sent to switch on the light
… signal sent to keep the light on
… light remains on for a period of time (30 seconds)
if sensor value matches the stored value(s) …
… light will remain off
… will turn off after period of time (30 seconds)
works in a continues loop
[6]
10 (a) (i) 2 marks for 3 correct binary conversions, 1 mark for 2 correct binary conversions
0
0
0
1
1
0
1
0
1
1
1
[2]
1
(ii) 1 mark for each correct hex value converted
1AF
[3]
(b) 2 marks for working + 1 mark for correct answer
Working
– 1200 × 8 = 9600 (bytes)
– 9600/1024 or 9600/1000
Answer
– 9.4 or 9.6 kilobytes
[3]
(c) Any one from:
MAC address
–
–
–
–
Media Access Control (address)
unique number that identifies a device (connected to the Internet)
address is made up of manufacturer id + serial number of device
address is allocated by the manufacturer
Any one from:
IP address
–
–
–
–
–
Internet Protocol (address)
location/address of a device on the Internet
address is unique for given Internet session
address is supplied when a device connects to the Internet
address is allocated by the network
© UCLES 2016
[2]
Page 9
(d) –
–
.
Mark Scheme
354
Cambridge O Level – October/November 2016
record (layer)
handshake (layer)
Syllabus
2210
Paper
13
[2]
11 Any six from:
– Help stop the misuse of computers
– The use of computers needs to be governed
– Help keep users safer when using computers
– Provides rules for using computers
– Help stop intellectual property theft
– Helps prevent the misuse of personal information
– Reference to laws (relevant example)
– Reference to security issues (relevant example)
NOTE: Answer must refer to the importance of ethics and be more than a description of
ethics.
© UCLES 2016
[6]
.
355
Cambridge International Examinations
Cambridge Ordinary Level
* 3 9 5 3 9 3 5 0 7 5 *
2210/22
COMPUTER SCIENCE
Paper 2 Problem-solving and Programming
October/November 2016
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
Answer all questions.
DO NOT ATTEMPT TASKS 1, 2 AND 3 in the pre-release material; these are for information only.
You are advised to spend no more than 40 minutes on Section A (Question 1).
No marks will be awarded for using brand names of software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The maximum number of marks is 50.
This document consists of 11 printed pages and 1 blank page.
DC (CW/FD) 126911/1 R
© UCLES 2016
[Turn over
.
2
356
Section A
You are advised to spend no longer than 40 minutes answering this section.
Here is a copy of the pre-release material.
DO NOT attempt Tasks 1, 2 and 3 now.
Use the pre-release material and your experience from attempting the tasks before the examination to
answer Question 1.
Pre-release Material
The manager of a supermarket needs a program to record donations to charity. Each customer has
the choice of three charities to donate to, and 1% of their shopping bill will be donated to the chosen
charity.
Write and test a program for the manager.
•
•
•
Your program must include appropriate prompts for the entry of data.
Error messages and other output need to be set out clearly.
All variables, constants and other identifiers must have meaningful names.
You will need to complete these three tasks. Each task must be fully tested.
TASK 1 – Set up the donation system
Set up a routine that allows:
•
the names of three charities to be input and stored
•
the charity names to be displayed with a number (1, 2 or 3) beside each name
•
a choice of 1, 2 or 3 to be entered to choose the charity, all other entries rejected
•
the value of a customer’s shopping bill to be entered
•
the donation to be calculated
•
three totals to be set to zero ready to total each charity donation
TASK 2 – Record and total each donation
For a customer’s shopping bill:
•
input a charity choice of 1, 2 or 3
•
input the value of a customer’s shopping bill
•
calculate the donation
•
add the donation to the appropriate total
Output the name of the charity and the amount donated.
TASK 3 – Show the totals so far
Extend TASK 2 to accept:
•
donations from more customers
•
a charity choice of -1 to show the totals so far
Display the charities’ names and the totals in descending order of totals.
Calculate a grand total of all three totals.
Output ‘GRAND TOTAL DONATED TO CHARITY’ and the amount of the grand total.
© UCLES 2016
2210/22/O/N/16
.
3
357
1
(a) All variables, constants and other identifiers should have meaningful names.
(i)
For three of the variables that you have used in Task 1, state the name, type and its use.
Variable 1 name ................................................................................................................
Type ...................................................................................................................................
Use ....................................................................................................................................
Variable 2 name ................................................................................................................
Type ...................................................................................................................................
Use ....................................................................................................................................
Variable 3 name ................................................................................................................
Type ...................................................................................................................................
Use ............................................................................................................................... [3]
(ii)
Name and describe the data structure(s) that you have used to store the donation totals
for each charity. Explain why you chose your data structure(s).
Name of data structure(s) .................................................................................................
Description ........................................................................................................................
...........................................................................................................................................
Reason ..............................................................................................................................
...................................................................................................................................... [3]
© UCLES 2016
2210/22/O/N/16
[Turn over
.
4
358
(b) Write an algorithm to complete Task 2, using either pseudocode, programming statements
or a flowchart. You can assume that Task 1 has been completed.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [5]
© UCLES 2016
2210/22/O/N/16
.
5
359
(c) Explain how you show the totals so far (Task 3). You may include programming statements as
part of your explanation.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [6]
(d) Explain how you would change your solution for Task 1 to allow the number of charities to be
set to two, three or four by the manager.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
© UCLES 2016
2210/22/O/N/16
[Turn over
.
6
360
Section B
2
Read this section of program code that inputs positive numbers, discards any negative numbers
and then outputs the average. An input of zero ends the process.
1
2
3
4
5
6
7
8
9
10
11
Total = 0
Counter = 100
REPEAT
REPEAT
INPUT Num
UNTIL Num < 0
Total = Total + 1
Counter = Counter + Num
UNTIL Num = 0
Average = Total / (Counter - 1)
Print Average
There are four errors in this code.
Locate these errors and suggest a correction to remove each error.
Error 1 ..............................................................................................................................................
Correction .........................................................................................................................................
..........................................................................................................................................................
Error 2 ..............................................................................................................................................
Correction .........................................................................................................................................
..........................................................................................................................................................
Error 3 ..............................................................................................................................................
Correction .........................................................................................................................................
..........................................................................................................................................................
Error 4 ..............................................................................................................................................
Correction .........................................................................................................................................
..................................................................................................................................................... [8]
© UCLES 2016
2210/22/O/N/16
.
7
361
3
The flowchart below inputs an integer. The predefined function DIV gives the value of the division,
for example Z ← 11 DIV 3 gives the value Z = 3. The predefined function MOD gives the value
of the remainder, for example Z ← 11 MOD 3 gives the value Z = 2.
67$57
,1387;
,V;!
"
<HV
$
%
1R
;',9
;02'
287387;
(1'
287387%
;
$
Complete a trace table for each of the two input values 33 and 75.
Trace table for input value 33
X
A
B
OUTPUT
A
B
OUTPUT
Trace table for input value 75
X
[4]
© UCLES 2016
2210/22/O/N/16
[Turn over
.
8
362
4
IF ... THEN ... ELSE ... ENDIF and CASE ... OF ... OTHERWISE ... ENDCASE
are two different conditional statements that you can use when writing pseudocode.
Explain, using examples, why you would choose to use each conditional statement.
Example 1 ........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Reason for choice ............................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Example 2 ........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Reason for choice ............................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [6]
© UCLES 2016
2210/22/O/N/16
.
9
363
Question 5 begins on page 10.
© UCLES 2016
2210/22/O/N/16
[Turn over
.
310
64
5
A database, PLAYPRODUCTION, was set up to show the performance dates, prices and number
of seats available at a theatre specialising in Shakespeare productions.
Performance
Date
Number
Seats
Stalls
Number
Seats
Circle
Price Stalls
Seats $
Price Circle
Seats $
As You Like It
01/07/2016
120
90
20.00
30.00
As You Like It
02/07/2016
85
45
30.00
40.00
As You Like It
09/07/2016
31
4
30.00
40.00
Macbeth
14/07/2016
101
56
25.00
35.00
Macbeth
15/07/2016
50
34
25.00
35.00
Macbeth
16/07/2016
12
5
35.00
50.00
Julius Caesar
22/07/2016
67
111
20.00
20.00
Julius Caesar
23/07/2016
21
24
15.00
15.00
A Comedy of Errors
30/07/2016
45
36
35.00
45.00
Play
(a) Give the number of fields that are in each record.
.............................................................................................................................................. [1]
(b) State the data type you would choose for each of the following fields.
Play ..........................................................................................................................................
Number Seats Stalls ...............................................................................................................
Price Stalls Seats $ ............................................................................................................ [3]
(c) The query-by-example grid below selects all the productions with more than 100 seats left in
either the stalls or the circle.
Field: Play
Performance Date
Number Seats Stalls
Number Seats Circle
Table: PLAYPRODUCTION
PLAYPRODUCTION
PLAYPRODUCTION
PLAYPRODUCTION
Sort: Ascending

Show:

Criteria:
> 100
or:
> 100
Show what would be output from the query-by-example.
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
© UCLES 2016
2210/22/O/N/16
.
311
65
(d) Complete the query-by-example grid below to select all the productions with at least six seats
left in the circle and show the Play, Performance Date and Price Circle Seats $ in Performance
Date order.
Field:
Table:
Sort:
Show:
Criteria:
or:
[5]
© UCLES 2016
2210/22/O/N/16
.
366
Cambridge International Examinations
Cambridge Ordinary Level
COMPUTER SCIENCE
2210/22
October/November 2016
Paper 2
MARK SCHEME
Maximum Mark: 50
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the October/November 2016 series for most
®
Cambridge IGCSE , Cambridge International A and AS Level components and some Cambridge O Level
components.
® IGCSE is the registered trademark of Cambridge International Examinations.
This document consists of 6 printed pages.
© UCLES 2016
[Turn over
.
Page 2
Mark Scheme
367
Cambridge O Level – October/November 2016
Syllabus
2210
Paper
22
Section A
1
(a) (i) Many correct answers, they must be meaningful. This is an example only.
– Choice, integer, choice of charity
– Cost, real, cost of shopping
– Donation, real, donation calculated from cost of shopping
[3]
(ii) – Array
– a set of (similar) variables grouped together// description or array declaration applied
to the scenario e.g. DonationTotals[1:3]
– allows for more efficient programing e.g. use of indices//each charity total can be
identified by an index
or
– List
– a set of variables grouped together// description or list declaration applied to the
scenario e.g. DonationTotals[]
– allows for more efficient programing e.g. use of a loop to update each charity
or
– Variables
– storage locations that can be changed// description or declaration applied to the
scenario e.g. DonationTotal1, DonationTotal2 and DonationTotal3
– e.g. as there are only 3 charities so there is no need to use an array
[3]
(b) Any five from:
– Prompt for input of charity choice // prompt for input of value of shopping
– input charity choice
– check for input of 1, 2, or 3
– input value of shopping
– calculate donation
– add donation to the appropriate total
– output name of charity and amount/total amount donated
[5]
Sample Answer.
REPEAT
PRINT 'Please enter choice of charity 1, 2. or 3 '
INPUT Choice
UNTIL Choice = 1 or Choice = 2 or Choice = 3
PRINT 'Please enter value of shopping bill '
INPUT BillValue
Donation BillValue * 0.01
Total (Choice) Total (Choice) + Donation
PRINT 'Charity ', CharityName (Choice), ' has received a donation
of ', Donation
© UCLES 2016
Page 3
.
Mark Scheme
368
Cambridge O Level – October/November 2016
Syllabus
2210
Paper
22
(c) Maximum six marks in total for question part
Description (may include reference to program statements)
– when charity choice = -1
– display total donation for each charity …
– … with corresponding charity name…
– description of method for selecting descending order of totals
– evidence that the method works
– calculate grand total from 3 totals / sum of all donations
– output ‘GRAND TOTAL DONATED TO CHARITY’ and grand total
[6]
(d) Any three from:
– input number of charities
– store the number of charities as a variable
– change the upper value of the choice input
– change the array bounds for total donations etc.// add new variables to hold extra values
– the need to change the code…
– … to allow for differing number of charities
[3]
© UCLES 2016
Page 4
.
Mark Scheme
369
Cambridge O Level – October/November 2016
Syllabus
2210
Paper
22
Section B
2
1 mark for identifying each error, 1 mark for the corresponding change
– line 2 or Counter = 100
– Counter = 0
– line 6 or UNTIL Num < 0
– UNTIL Num >= 0
– line 7 or Total = Total + 1
– Total = Total + Num
– line 8 or Counter = Counter + Num
– Counter = Counter + 1
3
[8]
Trace table for input value 33
X
A
B
OUTPUT
33
4
1
1
4
Å
4
Æ
(1 mark)
(1 mark)
Trace table for input value 75
X
A
B
OUTPUT
75
9
3
3
9
1
1
1
1
Å
1
(1 mark)
Æ
(1 mark)
[4]
© UCLES 2016
.
Page 5
4
Mark Scheme
370
Cambridge O Level – October/November 2016
Syllabus
2210
Paper
22
For each example: 1 mark for correct structure, 1 mark for appropriate content, 1 mark for
the reason. There are many correct answers these are only examples
IF X > 0 AND X <= 10
THEN PRINT 'In Range'
ELSE PRINT 'Out of Range'
ENDIF
– e.g. checking a condition that may be complex//uses relational operators// checking for a range
of values// only 2 options
CASE X OF
1 : PRINT 'Option 1'
2 : PRINT 'Option 2'
3 : PRINT 'Option 3'
OTHERWISE PRINT 'Incorrect choice'
ENDCASE
– e.g. checking for discrete/large number/more than 2 of values
[6]
5
(a) – 6
[1]
(b)
– Play
– No Seats Stalls
– Price Stalls Seats $
text
number
currency
[3]
(c) 1 mark for correct plays, 1 mark for correct dates with each play and no extra fields or
text, 1 mark for the order
As You Like It
01/07/2016
Julius Caesar
22/07/2016
Macbeth
14/07/2016
[3]
© UCLES 2016
Page 6
.
Mark Scheme
371
Cambridge O Level – October/November 2016
(d)
Field: Play
Table: PLAYPRODUCTION
Sort:
Show:
Syllabus
2210
Paper
22
Performance Date
Number Seats Circle
Price Circle Seats $
PLAYPRODUCTION
PLAYPRODUCTION
PLAYPRODUCTION
†
;
(2 marks)
1 for Criteria
1 for correct Field &
Table & Sort & Show
& or
(1 mark)
Ascending/
Descending
;
;
Criteria:
>=6
or:
(1 mark)
(1 mark)
[5]
© UCLES 2016
.
372
Cambridge International Examinations
Cambridge Ordinary Level
* 6 5 4 3 2 0 7 9 0 7 *
2210/23
COMPUTER SCIENCE
Paper 2 Problem-solving and Programming
October/November 2016
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
Answer all questions.
DO NOT ATTEMPT TASKS 1, 2 AND 3 in the pre-release material; these are for information only.
You are advised to spend no more than 40 minutes on Section A (Question 1).
No marks will be awarded for using brand names of software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The maximum number of marks is 50.
This document consists of 11 printed pages and 1 blank page.
DC (LK/SW) 125804/1
© UCLES 2016
[Turn over
.
2
373
Section A
You are advised to spend no longer than 40 minutes answering this section.
Here is a copy of the pre-release material.
DO NOT attempt Tasks 1, 2 and 3 now.
Use the pre-release material and your experience from attempting the tasks before the examination to
answer Question 1.
Pre-release Material
The headteacher of a school needs a program to record and count the votes for a class captain.
Each student in the class will be allowed one vote. There can be up to 30 students in a class.
Write and test a program for the headteacher.
•
•
•
Your program must include appropriate prompts for the entry of data.
Error messages and other output need to be set out clearly.
All variables, constants and other identifiers must have meaningful names.
You will need to complete these three tasks. Each task must be fully tested.
TASK 1 – Set up the voting
Each class can choose from up to four different students as candidates for their class captain. Set
up a routine that allows:
•
•
•
•
•
between two and four different candidate names to be input and stored
the candidate names to be displayed with a number (1, 2, 3 or 4) beside each name
a choice of 1, 2, 3 or 4 to be entered to record a vote; all other entries are rejected
up to four totals set to zero ready to record the votes
a maximum of 30 votes to be cast
TASK 2 – Record and count each vote
Input a number 1, 2, 3 or 4; add 1 to the appropriate total.
Output the name of the candidate voted for or output ‘invalid vote’ if a vote is rejected.
TASK 3 – Show the result
When all the votes have been cast, display the candidates’ names with their totals in descending
order of totals. If there is a clear winner, display the candidate’s name with the words ‘NEW CLASS
CAPTAIN’ beside it; otherwise display ‘NO OVERALL WINNER’.
© UCLES 2016
2210/23/O/N/16
.
3
374
1
(a) All variables, constants and other identifiers should have meaningful names.
For four of the variables, constants or arrays that you used in Task 1, state the name, data
structure, data type and its use.
Name 1 ......................................................................................................................................
Data structure ............................................................................................................................
Data type ...................................................................................................................................
Use ............................................................................................................................................
Name 2 ......................................................................................................................................
Data structure ............................................................................................................................
Data type ...................................................................................................................................
Use ............................................................................................................................................
Name 3 ......................................................................................................................................
Data structure ............................................................................................................................
Data type ...................................................................................................................................
Use ............................................................................................................................................
Name 4 ......................................................................................................................................
Data structure ............................................................................................................................
Data type ...................................................................................................................................
Use ........................................................................................................................................[8]
© UCLES 2016
2210/23/O/N/16
[Turn over
.
4
375
(b) Write an algorithm to complete Task 2, using either pseudocode, programming statements
or a flowchart. You can assume that Task 1 has been completed and that there are three
candidates for class captain.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
..................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
© UCLES 2016
2210/23/O/N/16
.
5
376
(c) Explain how you show the result (Task 3). You may include programming statements as part
of your explanation.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
(d) Explain how you could extend your solution to deal with the case of ‘NO OVERALL WINNER’.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
© UCLES 2016
2210/23/O/N/16
[Turn over
.
6
377
Section B
2
Read this section of program code that:
•
•
•
inputs 10 numbers
checks whether each number is within a specified range
totals the numbers within the range and outside the range
1
2
3
4
5
6
7
8
9
InRange = 0
OutRange = 1000
FOR Count = 1 TO 10
INPUT Num
IF Num > 10 AND Num < 20 THEN InRange = InRange + 1
ELSE OutRange = OutRange - 1
Count = Count + 1
NEXT X
PRINT InRange, OutRange
(a) There are four errors in this code.
Locate these errors and suggest a correction to remove each error.
Error 1 ........................................................................................................................................
Correction ..................................................................................................................................
...................................................................................................................................................
Error 2 ........................................................................................................................................
Correction ..................................................................................................................................
...................................................................................................................................................
Error 3 ........................................................................................................................................
Correction ..................................................................................................................................
...................................................................................................................................................
Error 4 ........................................................................................................................................
Correction ..................................................................................................................................
...............................................................................................................................................[4]
© UCLES 2016
2210/23/O/N/16
.
7
378
(b) Decide, with reasons, whether the numbers 10 and 20 are within or outside the range.
Number
Within
range (✓)
Outside
range (✓)
Reason
10
……………………………………………………………………..
……………………………………………………………………..
20
……………………………………………………………………..
……………………………………………………………………..
[4]
© UCLES 2016
2210/23/O/N/16
[Turn over
.
8
379
3
The flowchart below inputs the price of an item under $10. The change from a $10 note is output.
Any amount less than 5 cents is rounded up to 5 cents.
The predefined function INT rounds a number down to the nearest whole number; for example
Z ← INT(5.7) gives the value Z = 5
START
INPUT Price
Change
10 – Price
Is
Change
>= 1?
Yes
No
Dollars
Change
INT(Change)
Change – INT(Change)
OUTPUT Dollars,
" dollars"
Is
Change
>= 0.5?
Yes
Change
No
TenCents
Change – 0.5
OUTPUT "One 50
cent coin"
INT(Change * 10 + 0.5)
OUTPUT TenCents,
" ten cent coins"
Is Change*10 –
TenCents
> 0?
Yes
No
END
© UCLES 2016
2210/23/O/N/16
OUTPUT "One 5
cent coin"
.
9
380
Complete the trace table for the input data: 6.29
Price
Change
Dollars
TenCents
OUTPUT
[5]
4
Four validation checks and four descriptions are shown below.
Draw a line to link each validation check to the correct description.
Validation check
Description
Presence check
Numbers between two
given values are accepted
Range check
Data is of a particular
specified type
Type check
Data contains an exact
number of characters
Length check
Ensures that some data
have been entered
[3]
© UCLES 2016
2210/23/O/N/16
[Turn over
.
310
81
5
REPEAT ... UNTIL
and
WHILE ... DO ... ENDWHILE are two different loop
structures you can use when writing pseudocode.
Explain, using examples, why you would choose to use each type of loop.
Example 1 .........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Reason for choice .............................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Example 2 .........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Reason for choice .............................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
© UCLES 2016
2210/23/O/N/16
.
311
82
6
A database, THEATRETOURS, was set up to show the tour dates, towns, number of seats and
prices in local currency for a Shakespeare play.
Town
Tour Date
Number of Seats
Price Local Currency
Wigan
18/08/2016
120
15.00
Dumfries
20/08/2016
160
12.50
Turin
25/08/2016
200
17.00
Macon
27/08/2016
75
18.00
Bordeaux
29/08/2016
170
20.00
Algiers
01/09/2016
125
1350.00
Windhoek
05/09/2016
65
90.00
Windhoek
06/09/2016
65
90.00
Port Elizabeth
10/09/2016
200
110.00
(a) Explain why none of the fields in the database can be used as a primary key.
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) State a field that could be added as a primary key.
...................................................................................................................................................
Give a reason for choosing this field.
...................................................................................................................................................
...............................................................................................................................................[2]
(c) Use the query-by-example grid below to provide a list of tour dates and seat prices in
alphabetical order of town.
Field:
Table:
Sort:
Show:
Criteria:
or:
[4]
© UCLES 2016
2210/23/O/N/16
.
383
Cambridge International Examinations
Cambridge Ordinary Level
COMPUTER SCIENCE
2210/23
October/November 2016
Paper 2
MARK SCHEME
Maximum Mark: 50
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the October/November 2016 series for most
®
Cambridge IGCSE , Cambridge International A and AS Level components and some Cambridge O Level
components.
® IGCSE is the registered trademark of Cambridge International Examinations.
This document consists of 5 printed pages.
© UCLES 2016
[Turn over
Page 2
.
Mark Scheme
384
Cambridge O Level – October/November 2016
Syllabus
2210
Paper
23
Section A
1
(a) Many correct answers, the identifiers must be meaningful. These are examples only.
There are two marks available for each identifier:
• 1 mark for suitable name
• 1 mark for a suitable data structure, data type and use
– MaxVotes, constant, integer, maximum number of votes that can be cast
– CandidateName, array, string, name of candidate
– NoCandidates, variable, integer, number of candidates
– TotalNoCandidateVotes, array, integer, total number of votes cast
[8]
(b) Any four from:
– prompt for input of candidate number
– input of candidate number
– check for candidate number of 1, 2 or 3
– output ‘invalid vote’ if input not 1, 2, or 3
– otherwise add 1 to appropriate total and …
– … output name of candidate voted for
[4]
(c) Description (may include reference to programming statements) any six marks from
– output total and …
– … corresponding candidate name...
– description of method for selecting descending order of totals
– evidence that the method works
– check if highest number of votes is a unique value
– if unique output the candidate name and ‘NEW CLASS CAPTAIN’
– otherwise output ‘NO OVERALL WINNER’
[6]
(d) Accept any reasonable suggestion(s), two marks can be awarded for either a suggestion with
an accompanying description e.g.
– re run the voting (1) without the least popular candidate (1)
or accept two different suggestions e.g.
– re run the voting
– give the teacher the casting vote.
© UCLES 2016
[2]
.
Page 3
Mark Scheme
385
Cambridge O Level – October/November 2016
Syllabus
2210
Paper
23
Section B
2
(a) 1 mark for each change
– Line 2: OutRange = 0
– Line 6: should be OutRange = OutRange + 1
– Line 7: not needed
– Line 8: NEXT X should be NEXT Count / Line 3: FOR Count = 1 TO 10 should be
FOR X = 1 TO 10
[4]
(b)
Number
Within
range (9)
Outside
range (9)
Reason
10
9
Range greater than 10, so 10 not included
…………………………………………………………
20
9
Range less than 20, so 20 not included
…………………………………………………………
[4]
3
Price
Change
Dollars
TenCents
OUTPUT
6.29
3.71
3
0.71
3 dollars
0.21
One 50 cent coin
2
2 ten cent coins
One 5 cent coin
(1 mark per correct column)
[5]
© UCLES 2016
Page 4
4
.
Mark Scheme
386
Cambridge O Level – October/November 2016
Syllabus
2210
Paper
23
1 mark for each correct link up to maximum of 3 marks
[3]
5
For each example 1 mark for correct structure, 1 mark for appropriate content inside loop and
1 mark for reason. There are many correct answers these are only samples
REPEAT
..INPUT Number
Total ← Total + Number
UNTIL Number = 0
– at least one repeat is required
6
WHILE Number <> -1 DO
..INPUT Number
Total ← Total + Number
ENDWHILE
– the loop may never be executed
[6]
(a) –
–
Town has duplicate entries/all fields can have duplicate entries
fields other than Town not suitable identifiers
[2]
(b) –
–
Performance number …
… uniquely identifies each performance
[2]
© UCLES 2016
.
Page 5
Mark Scheme
387
Cambridge O Level – October/November 2016
(c)
Field: Town
Table: THEATRETOURS
Syllabus
2210
Tour Date
Price Local
Currency
THEATRETOURS
THEATRETOURS
;
;
Paper
23
Sort: Ascending
Show:
;
†
Criteria:
or:
1 mark for each column + 1 mark for correct fields only
© UCLES 2016
[4]
.
388
Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
* 4 5 7 2 4 7 7 1 5 8 *
0478/12
COMPUTER SCIENCE
Paper 1 Theory
May/June 2017
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
Answer all questions.
No marks will be awarded for using brand names of software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The maximum number of marks is 75.
The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
This document consists of 12 printed pages.
DC (CW/JG) 134134/3
© UCLES 2017
[Turn over
.
2
389
1
Name three different buses that are used in the fetch-execute cycle.
Bus 1 ������������������������������������������������������������������������������������������������������������������������������������������������
Bus 2 ������������������������������������������������������������������������������������������������������������������������������������������������
Bus 3 ������������������������������������������������������������������������������������������������������������������������������������������������
[3]
2
Give two examples of primary, secondary and off-line storage.
Primary
Example 1 ����������������������������������������������������������������������������������������������������������������������������������������
Example 2 ����������������������������������������������������������������������������������������������������������������������������������������
Secondary
Example 1 ����������������������������������������������������������������������������������������������������������������������������������������
Example 2 ����������������������������������������������������������������������������������������������������������������������������������������
Off-line
Example 1 ����������������������������������������������������������������������������������������������������������������������������������������
Example 2 ����������������������������������������������������������������������������������������������������������������������������������������
[6]
© UCLES 2017
0478/12/M/J/17
.
3
390
3
The diagram shows five output devices and five descriptions.
Draw a line between each output device and its description.
Output Device
Description
Inkjet printer
Flat panel display that uses the light modulating
properties of liquid crystals.
LCD screen
Flat panel display that uses an array of
light‑emitting diodes as pixels.
2D cutter
Droplets of ink are propelled onto paper.
LED screen
Electrically charged powdered ink is transferred
onto paper.
Laser printer
High powered laser that uses the x-y plane.
[4]
© UCLES 2017
0478/12/M/J/17
[Turn over
.
4
391
4
There are various methods used to detect errors that can occur during data transmission and
storage.
Describe each of the following error detection methods.
Parity check �������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
Check digit ���������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
Checksum ����������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
Automatic Repeat request (ARQ) ����������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
[8]
© UCLES 2017
0478/12/M/J/17
.
5
392
5
(a) The denary number 57 is to be stored in two different computer registers.
Convert 57 from denary to binary and show your working.
���������������������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
�����������������������������������������������������������������������������������������������������������������������������������������������[2]
(b) Show the binary number from part (a) as it would be stored in the following registers.
Register 1
Register 2
[2]
(c) A binary number stored in a register can have many different uses, for example an address in
main memory.
Give two other uses for a binary number stored in a register.
Use 1 ����������������������������������������������������������������������������������������������������������������������������������������
Use 2 ����������������������������������������������������������������������������������������������������������������������������������������
[2]
(d) A register in a computer contains binary digits.
0
0
1
1
1
0
1
0
The contents of the register represent a binary integer.
Convert the binary integer to hexadecimal.
....................................................................................................................................................
................................................................................................................................................[1]
© UCLES 2017
0478/12/M/J/17
[Turn over
.
6
393
6
Airline boarding passes can be read from a smartphone instead of a printout.
Back
Boarding Pass
A
TSA Pre
Passenger Webb / Alan
B 15
Boarding
Boarding
Position
Group
Flight 683
JFK – LAX
Date
Thursday, November 10, 2016
Departs 8.15 pm
Gate
C4
Time, gate and terminals may change - check monitors
Fly Rewards
Fly Rewards# 12345678
Conf# BC123D
Identify what type of barcode A is an example of. Explain how the data stored in this type of
barcode is read.
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
������������������������������������������������������������������������������������������������������������������������������������������������������[4]
© UCLES 2017
0478/12/M/J/17
.
7
394
7
Computer A is communicating with computer B.
(a) Draw an arrow or arrows to show simplex, duplex and half-duplex data transmission. The
direction of the data transmission must be fully labelled.
Simplex data transmission
Computer A
Computer B
Duplex data transmission
Computer A
Computer B
Half-duplex data transmission
Computer A
Computer B
[6]
(b) State a use for the following data transmission methods. The use must be different for each
data transmission method.
Simplex �������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
Duplex ��������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
[2]
© UCLES 2017
0478/12/M/J/17
[Turn over
.
8
395
(c) A computer includes an Integrated Circuit (IC) and a Universal Serial Bus (USB) for data
transmission.
Describe how the computer uses these for data transmission, including the type of data
transmission used.
IC ����������������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
USB ������������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
[4]
© UCLES 2017
0478/12/M/J/17
.
9
396
8
A company has a number of offices around the world.
(a) Data is transmitted between the offices over the Internet. In order to keep the data safe the
company is using Secure Socket Layer (SSL) protocol and a firewall at each office.
Explain how SSL protocol and a firewall will keep the company’s data safe.
SSL protocol �����������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
Firewall �������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
[4]
(b) A company stores personal details of its customers on a computer system behind a firewall.
Explain, with reasons, what else the company should do to keep this data safe.
���������������������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
�����������������������������������������������������������������������������������������������������������������������������������������������[6]
© UCLES 2017
0478/12/M/J/17
[Turn over
.
310
97
9
A cold store is kept at a constant low temperature using a sensor, a microprocessor and a cooling
unit.
Explain how the sensor and microprocessor will maintain a constant low temperature.
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
������������������������������������������������������������������������������������������������������������������������������������������������������[6]
© UCLES 2017
0478/12/M/J/17
.
311
98
10 For this logic statement:
X = 1 if (( A is 1 AND B is 1 ) OR ( B is 1 AND C is NOT 1 ))
(a) Draw the logic circuit.
A
B
X
C
[4]
(b) Complete the truth table for the given logic statement.
A
B
C
0
0
0
0
0
1
0
1
0
0
1
1
1
0
0
1
0
1
1
1
0
1
1
1
Working space
X
[4]
© UCLES 2017
0478/12/M/J/17
[Turn over
.
312
99
11
A company sells smartphones over the Internet.
Explain how the information stored on the company’s website is requested by the customer, sent
to the customer’s computer and displayed on the screen.
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
������������������������������������������������������������������������������������������������������������������������������������������������������[7]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
© UCLES 2017
0478/12/M/J/17
.
400
Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
COMPUTER SCIENCE
0478/12
Paper 1
May/June 2017
MARK SCHEME
Maximum Mark: 75
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2017 series for most Cambridge IGCSE®,
Cambridge International A and AS Level and Cambridge Pre-U components, and some Cambridge O Level
components.
® IGCSE is a registered trademark.
This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
This document consists of 9 printed pages.
© UCLES 2017
[Turn over
.
0478/12
Cambridge IGCSE – Mark Scheme
PUBLISHED
401
Question
1
Answer
•
•
•
2
Marks
3
address (bus)
control (bus)
data (bus)
Question
May/June 2017
Answer
2 marks for each type of storage
Marks
6
Primary storage
• RAM
• ROM
Secondary storage
• hard disk drive (HDD)
• solid state drive (SSD)
Off-line storage e.g.
• CD
• DVD
• Blu-ray
• Flash memory // USB storage
• removable / external / portable hard disk drive (HDD/SSD)
• SD card
Question
Answer
3
4
1 mark for each correct line to a max of 4 marks.
© UCLES 2017
Marks
Page 2 of 9
0478/12
Question
4
.
Cambridge IGCSE – Mark Scheme
PUBLISHED
402
May/June 2017
Answer
Two marks for each correct description
Parity Check
• Checks a byte of data
• Check is performed when data is received
• A parity bit is added (to the parity byte)
• Counts / checks number of 1’s // counts / checks to see if 1’s are even
// counts / checks to see if 1’s are odd
• Can be even or odd
• If parity is incorrect, error is detected
Check digit
• A digit that is calculated from the data // uses modulo to calculate digit
// valid description of modulo
• It is appended / added to the data
• Digit is recalculated when data is entered
• Digits are compared to check for error
Checksum
• A value is calculated from the data // Valid description of calculation
• It is transmitted with the data
• Value is recalculated after transmission
• Values are compared after transmission to check for error
Automatic Repeat reQuest
• Uses acknowledgement / request and time-out
• Error control protocol
• Check performed on receiving data // error is detected by e.g. parity
check, check sum
• If error detected, request is sent to resend data // negative
acknowledgement is used
• Resend request is repeated till data is sent correctly / requests time
out / limit is reached
• Send acknowledgement that data is received // positive
acknowledgement is used
• If acknowledgement not received in set time data is resent
© UCLES 2017
Page 3 of 9
Marks
8
.
0478/12
Question
5(a)
May/June 2017
Cambridge IGCSE – Mark Scheme
PUBLISHED
403
Answer
Marks
1 mark for correct method, 1 mark for correct answer
2
32 + 16 + 8 + 1
(00)111001
5(b)
registers must have leading zeros, allow follow through from 5(a) for an
incorrect value
1 mark for each correct register.
0
0
0
5(c)
0
0
0
1
0
0
0
0
0
0
1
0
1
1
1
0
0
data
ASCII value / Unicode value / character
number
part of image / small image
a sound / sound sample / small sound track
instruction
1
Answer
1 mark for correct name of code, up to a further 3 marks for appropriate
explanation
•
Quick response (QR) Code
Three from:
• Barcode is captured / scanned / imaged, by a camera / scanner /
barcode reader / QR code reader
• Read using a laser
• Processed by an app
• Light is reflected back
• Black squares reflect less light than white squares
• Modules are used for orientation / alignment
• Squares / data are decoded
© UCLES 2017
1
2
3A
Question
6
0
1
Two from:
•
•
•
•
•
•
5(d)
1
2
Page 4 of 9
Marks
4
.
0478/12
Cambridge IGCSE – Mark Scheme
PUBLISHED
404
Question
7(a)
May/June 2017
Answer
1 mark for correct arrow(s), one mark for correct description
OR
(Direction of data is) one way only // unidirectional
#
(Direction of data is both ways) at same time / simultaneously / concurrently
AND
(Direction of data is both ways) but at different times / not at the same time /
not simultaneously / not concurrently
© UCLES 2017
Page 5 of 9
Marks
6
.
0478/12
Cambridge IGCSE – Mark Scheme
PUBLISHED
405
Question
7(b)
May/June 2017
Answer
1 mark each use, must be different.
Marks
2
Simplex e.g.:
Microphone to computer
Sensor to computer
Computer to printer
Computer to speaker
Computer to monitor
Webcam to computer
Sending data to a device // sending data from a device
Duplex e.g.:
Telephone call
Voice over IP
Computer to printer (only award once)
Instant messaging
Broadband connections
Video conferencing
Sending data to and from devices e.g wireless technology
Computer to modem
7(c)
2 marks for IC, 2 marks for USB
4
IC
•
•
USB
•
•
Question
8(a)
parallel transmission // description of parallel
for sending data internally
serial transmission // description of serial
for sending data externally (to and from peripherals / between
devices)
Answer
2 marks for SSL, 2 marks for Firewall
SSL protocol
Two from:
• uses encryption
• encryption is asymmetric / symmetric / both
• makes use of (public and private) keys
• data is meaningless (without decryption key / if intercepted)
Firewall
Two from:
• helps prevent unauthorised access // helps prevent hacking
• checks that data meets criteria // identifies when data does not meet
criteria
• acts as a filter for (incoming and outgoing) data // blocks any
unacceptable data //allows acceptable data through
© UCLES 2017
Page 6 of 9
Marks
4
.
0478/12
Cambridge IGCSE – Mark Scheme
PUBLISHED
406
Question
8(b)
May/June 2017
Answer
Six from:
Marks
6
Encrypt the data «
« so it cannot be understood by those not entitled to view it
Password protected / biometrics «
« to help prevent unauthorised access
Virus checking software «
« helps prevent data corruption or deletion
« identifies / removes a virus in the system
« scans a system for viruses
Spyware checking software «
« helps prevent data being stolen/copied/logged
« scans a system for spyware
Drop-down input methods / selectable features «
« to reduce risk of spyware / keylogging
Physical method e.g. locked doors / CCTV timeout / auto log off
« to help prevent unauthorised access
Network / company policies // training employees
« to educate users how to be vigilant
Access rights «
« allows users access to data that they have permission to view
« prevents users from accessing data that they do not have permission to
view
Question
9
Answer
Six from:
•
•
•
•
•
•
•
•
•
•
© UCLES 2017
Marks
6
temperature sensor
analogue data / temperature is converted to digital data (with an ADC)
sensor sends signal to the microprocessor
microprocessor compares input values with stored values/pre-set
values «
« if the temperature value input is too high/low «
« a signal is sent from the microprocessor to turn on / off / up / down
the cooling unit
« if temperature matches the stored values «
« no action is taken
an actuator is used to turn the cooling unit on / off / up / down
the process is a continuous loop
Page 7 of 9
.
0478/12
Cambridge IGCSE – Mark Scheme
PUBLISHED
407
Question
10(a)
Answer
Marks
1 mark for each correct gate, with the correct input(s)
10(b)
4
4
A
B
C
X
0
0
0
0
0
0
1
0
0
1
0
1
0
1
1
0
1
0
0
0
1
0
1
0
1
1
0
1
1
1
1
1
4 marks for 8 correct outputs
3 marks for 6 or 7 correct outputs
2 marks for 4 or 5 correct outputs
1 mark for 2 or 3 correct outputs
© UCLES 2017
May/June 2017
Page 8 of 9
.
0478/12
Cambridge IGCSE – Mark Scheme
PUBLISHED
408
Question
11
May/June 2017
Answer
Seven from:
7
Requested
• a web browser is used
• user enters the URL / web address (into the address bar) // clicks a
link containing the web address // clicks an element of the webpage
• the URL / web address specifies the protocol
• protocols used are Hyper Text Transfer Protocol (HTTP) / Hyper Text
Transfer Protocol Secure (HTTPS)
Sent
•
•
•
•
•
the URL / web address contains the domain name
the Internet Service Provider (ISP) looks up the IP address of the
company
the domain name is used to look up the IP address of the company
the domain name server (DNS) stores an index of domain names and
IP addresses
web browser sends a request to the web server / IP address
Received
• Data for the website is stored on the company’s web server
• webserver sends the data for the website back to the web browser
• web server uses the customer’s IP address to return the data
• the data is transferred into Hyper Text Mark-up Language (HTML)
• HTML is interpreted by the web browser (to display the website)
© UCLES 2017
Marks
Page 9 of 9
.
409
Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
0478/22
COMPUTER SCIENCE
Paper 2 Problem-solving and Programming
May/June 2017
PRE-RELEASE MATERIAL
No Additional Materials are required.
* 9 6 0 8 7 9 8 3 5 0 *
This material should be given to the relevant teachers and candidates as soon as it has been received
at the Centre.
READ THESE INSTRUCTIONS FIRST
Candidates should use this material in preparation for the examination. Candidates should attempt the
practical programming tasks using their chosen high-level, procedural programming language.
The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
This document consists of 2 printed pages.
DC (RW) 132151/3
© UCLES 2017
[Turn over
.
2
410
In preparation for the examination candidates should attempt the following practical tasks by writing
and testing a program or programs.
The organiser of a senior citizens’ club arranges outings for the members. For each of these outings a
coach is hired, meals at a restaurant are reserved and tickets for the theatre are booked. A program is
required to work out the costs and provide a printed list showing everyone on the outing.
Write and test a program for the club organiser.
•
•
•
Your program must include appropriate prompts for the entry of data.
Error messages and other output need to be set out clearly.
All variables, constants and other identifiers must have meaningful names.
You will need to complete these three tasks. Each task must be fully tested.
TASK 1 – Work out the total cost of the outing.
The organiser finds out how many senior citizens would be interested in the outing. The program for
TASK 1 works out the cost from this information.
Number of people
Hire of coach ($)
Cost of a meal ($)
Cost of a theatre ticket ($)
12–16
150
14.00
21.00
17–26
190
13.50
20.00
27–39
225
13.00
19.00
The minimum number of senior citizens needed for the outing to go ahead is 10; there cannot be more
than 36 senior citizens on the outing. A minimum of two carers must go on the outing, with an additional
carer needed if more than 24 senior citizens go on the outing. Carers do not have to pay anything for
the outing. Work out the total cost and the cost per person for the senior citizens.
TASK 2 – Record who is going on the outing and how much has been paid.
Using your results from TASK 1, record the names of the people on the outing and the amount they
have paid; include the carers on the outing. If there are spare places on the coach then extra people
can be added; they are charged the same price as the other senior citizens. Calculate the total amount
of money collected. Print out a list of the people on the outing.
TASK 3 – Identify the break-even point or profit that will be made on the outing.
Show whether the outing has made a profit or has broken even using the estimated cost from TASK 1
and the money collected from TASK 2.
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
© UCLES 2017
0478/22/PRE/M/J/17
.
411
Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
* 5 4 1 6 1 0 3 0 3 1 *
0478/22
COMPUTER SCIENCE
Paper 2 Problem-solving and Programming
May/June 2017
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
Answer all questions.
DO NOT ATTEMPT TASKS 1, 2 AND 3 in the pre-release material; these are for information only.
You are advised to spend no more than 40 minutes on Section A (Question 1).
No marks will be awarded for using brand names of software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The maximum number of marks is 50.
The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
This document consists of 11 printed pages and 1 blank page.
DC (RW/CGW) 132150/3
© UCLES 2017
[Turn over
.
2
412
Section A
You are advised to spend no longer than 40 minutes answering this section.
Here is a copy of the pre-release material.
DO NOT attempt Tasks 1, 2 and 3 now.
Use the pre-release material and your experience from attempting the tasks before the examination to
answer Question 1.
Pre-release material
The organiser of a senior citizens’ club arranges outings for the members. For each of these
outings a coach is hired, meals at a restaurant are reserved and tickets for the theatre are booked.
A program is required to work out the costs and provide a printed list showing everyone on the outing.
Write and test a program for the club organiser.
•
•
•
Your program must include appropriate prompts for the entry of data.
Error messages and other output need to be set out clearly.
All variables, constants and other identifiers must have meaningful names.
You will need to complete these three tasks. Each task must be fully tested.
TASK 1 – Work out the total cost of the outing.
The organiser finds out how many senior citizens would be interested in the outing. The program for
TASK 1 works out the cost from this information.
Number of people
Hire of coach ($)
Cost of a meal ($)
Cost of a theatre ticket ($)
12–16
150
14.00
21.00
17–26
190
13.50
20.00
27–39
225
13.00
19.00
The minimum number of senior citizens needed for the outing to go ahead is 10; there cannot be
more than 36 senior citizens on the outing. A minimum of two carers must go on the outing, with an
additional carer needed if more than 24 senior citizens go on the outing. Carers do not have to pay
anything for the outing. Work out the total cost and the cost per person for the senior citizens.
TASK 2 – Record who is going on the outing and how much has been paid.
Using your results from TASK 1, record the names of the people on the outing and the amount they
have paid; include the carers on the outing. If there are spare places on the coach then extra people
can be added; they are charged the same price as other senior citizens. Calculate the total amount
of money collected. Print out a list of the people on the outing.
TASK 3 – Identify the break-even point or profit that will be made on the outing.
Show whether the outing has made a profit or has broken even using the estimated cost from TASK 1
and the money collected from TASK 2.
© UCLES 2017
0478/22/M/J/17
.
3
413
1
(a) All variables, constants and other identifiers should have meaningful names.
(i)
For a variable that you have used to record information about the cost of the outing in
Task 1, state the name, data type and its use.
Variable name ....................................................................................................................
Data type ............................................................................................................................
Use .....................................................................................................................................
[3]
(ii)
State two constants that you could have used for Task 1. Give the value that would be
assigned to each one and explain what it is used for.
Constant 1 name ................................................................................................................
Value 1 ...............................................................................................................................
Use 1 ..................................................................................................................................
Constant 2 name ................................................................................................................
Value 2 ...............................................................................................................................
Use 2 ..................................................................................................................................
[6]
(b) Explain how you would need to change your calculation in Task 1 if each carer were paid
$20.00 for coming on the outing.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
© UCLES 2017
0478/22/M/J/17
[Turn over
.
4
414
(c) Write an algorithm to complete Task 2, using either pseudocode, programming statements
or a flowchart. You can assume that Task 1 has been completed. You do not need to produce
the list of people on the outing.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
© UCLES 2017
0478/22/M/J/17
.
5
415
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
© UCLES 2017
0478/22/M/J/17
[Turn over
.
6
416
(d) Explain how your program completes Task 3. Any programming statements used in your
answer must be fully explained.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
© UCLES 2017
0478/22/M/J/17
.
7
417
Section B
2
(a) Write an algorithm to input three different numbers, and then output the largest number. Use
either pseudocode or a flowchart.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) Give two sets of test data to use with your algorithm in part (a) and explain why you chose
each set.
Test data set 1 ...........................................................................................................................
Reason ......................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Test data set 2 ...........................................................................................................................
Reason ......................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
© UCLES 2017
0478/22/M/J/17
[Turn over
.
8
418
3
This flowchart inputs the weight of items in kilograms to be loaded on a trailer. Any item over
25 kilograms is rejected. The trailer can take up to 100 kilograms.
START
TotalWeight
0
Reject
0
INPUT Weight
Yes
Is Weight
˃ 25?
Reject
No
TotalWeight
TotalWeight + Weight
Is
TotalWeight
˃ 100?
No
Yes
TotalWeight
TotalWeight – Weight
OUTPUT 'Weight of items '’
TotalWeight, ' Number of
items rejected ',Reject
END
© UCLES 2017
0478/22/M/J/17
Reject + 1
.
9
419
Complete the trace table for the input data:
13, 17, 26, 25, 5, 10, 15, 35, 20, 15
Weight
Reject
TotalWeight
OUTPUT
[5]
© UCLES 2017
0478/22/M/J/17
[Turn over
.
410
20
4
An algorithm has been written in pseudocode to input 100 numbers and print out the sum.
A REPEAT … UNTIL loop has been used.
Count ← 0
Sum ← 0
REPEAT
INPUT Number
Sum ← Sum + Number
Count ← Count + 1
UNTIL Count > 100
PRINT Sum
(a) Find the error in the pseudocode and suggest a correction.
Error ...........................................................................................................................................
Correction .................................................................................................................................
...................................................................................................................................................
[2]
(b) Rewrite the correct algorithm using a more suitable loop structure.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
© UCLES 2017
0478/22/M/J/17
.
411
21
5
A database table, SHEEP, is used to keep a record of the sheep on a farm. Each sheep has a
unique ear tag, EARnnnn; n is a single digit. The farmer keeps a record of the date of birth, the
gender and the current weight of each sheep in kilograms.
(a) Identify the four fields required for the database. Give each field a suitable name and data
type. Provide a sample of data that you could expect to see in the field.
Field 1 name ..............................................................................................................................
Data type ...................................................................................................................................
Data sample ..............................................................................................................................
Field 2 name ..............................................................................................................................
Data type ...................................................................................................................................
Data sample ..............................................................................................................................
Field 3 name ..............................................................................................................................
Data type ...................................................................................................................................
Data sample ..............................................................................................................................
Field 4 name ..............................................................................................................................
Data type ...................................................................................................................................
Data sample ..............................................................................................................................
[8]
(b) State the field that you would choose as the primary key.
...............................................................................................................................................[1]
(c) Using the query-by-example grid below, write a query to identify the ear tags of all male
sheep weighing over 10 kilograms. Only display the ear tags.
Field:
Table:
Sort:
Show:
Criteria:
or:
[3]
© UCLES 2017
0478/22/M/J/17
.
422
Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
COMPUTER SCIENCE
0478/22
Paper 2
May/June 2017
MARK SCHEME
Maximum Mark: 50
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2017 series for most Cambridge IGCSE®,
Cambridge International A and AS Level and Cambridge Pre-U components, and some Cambridge O Level
components.
® IGCSE is a registered trademark.
This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
This document consists of 6 printed pages.
© UCLES 2017
[Turn over
.
0478/22
Question
1(a)(i)
May/June 2017
Cambridge IGCSE – Mark Scheme
PUBLISHED
423
Answer
One variable name MUST relate to the cost of the outing in Task 1
Variable name
Data type to match variable
Description of the use of the given variable
Marks
3
(1)
(1)
(1)
Many correct answers, they must be meaningful. This is an example only.
NoSeniorCitizens (1), integer (1), number of senior citizens that
want to go on the outing (1)
1(a)(ii)
Two constants required, for each constant
Name
Value
Use
6
(1)
(1)
(1)
Many correct answers, they must be meaningful. These are examples only.
MinNoSeniorCitizens (1), 10 (1), minimum number of senior
citizens that can go on the outing (1)
MaxNoSeniorCitizens (1), 36 (1), maximum number of senior
citizens that can go on the outing (1)
Max 6 marks
1(b)
-
© UCLES 2017
calculate cost of carers // if more than 24 senior citizens on the trip cost
is 60 otherwise cost is 40
add to the cost of the outing
Page 2 of 6
2
0478/22
Question
1(c)
.
Cambridge IGCSE – Mark Scheme
PUBLISHED
424
May/June 2017
Answer
Any five from:
loop for number of senior citizens on the trip
input with prompts name and amount paid
store name and amount paid in appropriate place in arrays
total the amount paid
check if spare places are available
if spare place is required remove a spare place//fill spare places
add name(s) to list in appropriate place(s)
store names of two carers
If number of senior citizens > 24 store name of third carer
Max 5 marks
Marks
5
Example
TotalPaid
0
FOR Counter
1 TO NoSenCit
PRINT "Please Enter Name"
INPUT SenCitName[Counter]
PRINT "Please Enter amount paid"
INPUT SenCitAmount[Counter]
TotalPaid
TotalPaid + Amount
NEXT Counter
Extras
TRUE
WHILE NoSenCit < 36 and Extras
PRINT "Do you want to add another person? Y/N"
INPUT Answer
IF Answer = "Y"
THEN
NoSenCit
NoSenCit + 1
PRINT "Please Enter Name"
INPUT SenCitName[NoSenCit]
ELSE Extras
FALSE
ENDIF
ENDWHILE
PRINT "Please Enter Name of First Carer"
INPUT Carer1
PRINT "Please Enter Name of Second Carer"
INPUT Carer2
IF NoSenCit > 24
THEN
PRINT "Please Enter Name of Third Carer"
INPUT Carer3
ENDIF
1(d)
© UCLES 2017
Explanation (any programming statements must be fully explained)
check total cost
««against total amount paid
if total cost < total amount paid display/show profit
if total cost = total amount paid display/show break even
Page 3 of 6
4
.
0478/22
Question
2(a)
May/June 2017
Cambridge IGCSE – Mark Scheme
PUBLISHED
425
Answer
Marks
award full marks for any working solution
Input three numbers
Attempt to select largest number
Working method
print out largest number
4
(1)
(1)
(1)
(1)
Sample algorithm
INPUT Num1, Num2, Num3
IF (Num1 > Num2) AND (Num1 > Num3) THEN PRINT Num1
ENDIF
IF (Num2 > Num1) AND (Num2 > Num3) THEN PRINT Num2
ENDIF
IF (Num3 > Num1) AND (Num3 > Num2) THEN PRINT Num3
ENDIF
or
INPUT Num1
Big
Num1
INPUT Num2, Num3
IF Num2 > Big THEN Big
IF Num3 > Big THEN Big
PRINT Big
2(b)
Num2 ENDIF
Num3 ENDIF
1 mark for each data set and 1 mark for the matching reason.
4
There are many possible correct answers, these are examples only.
Test data set 1:
Reason:
30, 29, 28
first number is the largest
Test data set 2:
Reason:
x, y, z
abnormal data, should be rejected
Max 4 marks
© UCLES 2017
Page 4 of 6
.
0478/22
Question
Answer
3
Weight
Reject
Total Weight
0
0
13
13
17
30
26
55
5
60
10
70
15
85
OUTPUT
105
(1 mark)
85
Weight of items 85 Number of
items rejected 2
(1 mark to 1st
85)
(1 mark 105, 85)
(1 mark)
Question
Answer
Error
Correction
or
Error
Correction
or
5
2
20
( 1mark)
Marks
1
25
35
4(a)
May/June 2017
Cambridge IGCSE – Mark Scheme
PUBLISHED
426
- Count
- Count
0
1
Marks
2
- UNTIL Count > 100
- UNTIL Count >= 100 or UNTIL Count = 100
UNTIL Count > 99
4(b)
-
use of FOR with correct start and end values «
« use of NEXT
« removal of increment for Count
3
Sample algorithm
Sum
0
FOR Count
1 TO 100
INPUT Number
Sum
Sum + Number
NEXT // NEXT Count
PRINT Sum
5(a)
for each field name (1), data type and sample (1)
The following are examples there are many different correct answers.
EarTag (1), text, EAR1011 (1)
DOB (1), date, 4/3/2017 (1)
Gender (1), text, M (1)
Weight (1), number, 5.9 (1)
© UCLES 2017
Page 5 of 6
8
.
0478/22
Question
5(b)
5(c)
May/June 2017
Cambridge IGCSE – Mark Scheme
PUBLISHED
427
Answer
Marks
EarTag
Field:
1
EarTag
Table: SHEEP
Gender
SHEEP
3
Weight
SHEEP
Sort:
Show:
;
Criteria:
†
=’M’
†
> 10
or:
(1 mark)
© UCLES 2017
(1 mark)
Page 6 of 6
(1 mark)
†
.
428
Cambridge International Examinations
Cambridge Ordinary Level
* 1 2 0 2 9 2 7 4 5 6 *
2210/12
COMPUTER SCIENCE
Paper 1 Theory
October/November 2017
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
Answer all questions.
No marks will be awarded for using brand names of software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The maximum number of marks is 75.
This document consists of 12 printed pages.
DC (SC) 152928
© UCLES 2017
[Turn over
.
2
429
1
A robot arm in a factory is programmed to move products.
The binary instructions to operate the robot arm are:
Operation
Binary Instruction
UP
1
1
1
1
DOWN
0
0
0
1
LEFT
1
0
0
1
RIGHT
0
1
1
0
OPEN
1
1
0
0
CLOSE
0
0
1
1
The instructions are entered as hexadecimal values.
An operator enters the values:
9
1
C
3
F
Convert the values and write down the operation (e.g. RIGHT) carried out by the robot arm.
9
.............................................................................
1
.............................................................................
C
.............................................................................
3
.............................................................................
F
.............................................................................
[5]
© UCLES 2017
2210/12/O/N/17
.
3
430
2
Storage devices and storage media can be categorised as primary, secondary or off-line.
Write primary, secondary or off-line next to each storage device or medium to indicate its most
suitable category.
3
HDD
....................................................................................................................................
RAM
....................................................................................................................................
ROM
....................................................................................................................................
CD-ROM
....................................................................................................................................
SSD
....................................................................................................................................
DVD-RAM
....................................................................................................................................
[6]
(a) Explain the differences between the binary number system and the denary number system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) Explain the process of converting the binary number 1010 into a denary number.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
© UCLES 2017
2210/12/O/N/17
[Turn over
.
4
431
4
A file server is used as a central data store for a network of computers.
Rory sends data from his computer to a file server that is approximately 100 metres away.
It is important that the data is transmitted accurately. Rory needs to be able to read data from and
write data to the file server at the same time.
(a) (i)
Use ticks (3) to identify the most suitable data transmission methods for this application.
Method 1
Tick
(3)
Method 2
Serial
Simplex
Parallel
Half-duplex
Tick
(3)
Duplex
[2]
(ii)
Explain why your answer to part (a)(i) is the most suitable data transmission.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[4]
© UCLES 2017
2210/12/O/N/17
.
5
432
(b) Identify and describe two methods of error checking that can be used to make sure that the
data stored after transmission is accurate.
Method 1 ...................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Method 2 ...................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
© UCLES 2017
2210/12/O/N/17
[Turn over
.
6
433
5
Raj is using the Internet to do some online shopping. He visits a website that tells him that it uses
cookies.
(a) Explain what is meant by the term cookies.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) Give two examples of the use of cookies.
Example 1 .................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Example 2 .................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
© UCLES 2017
2210/12/O/N/17
.
7
434
6
Selma writes the following four answers in her Computer Science examination.
State which computer terms she is describing.
“It is a signal. When the signal is received it tells the operating system that an event has occurred.”
Selma is describing ..........................................................................................................................
“It takes source code written in a high level language and translates it into machine code. It
translates the whole of the source code at once.”
Selma is describing ..........................................................................................................................
“The part of the central processing unit (CPU) that carries out calculations.”
Selma is describing ..........................................................................................................................
“When data is transmitted, if an error is detected in the data received a signal is sent to ask for the
data to be retransmitted. This continues until the data received is correct.”
Selma is describing ..........................................................................................................................
[4]
© UCLES 2017
2210/12/O/N/17
[Turn over
.
8
435
7
Draw a logic circuit to represent the logic statement:
X = 1 if (A is NOT 1 AND B is 1) AND (A is NOT 1 AND C is NOT 1) OR (B is 1 AND C is 1)
A
X
B
C
[7]
© UCLES 2017
2210/12/O/N/17
.
9
436
8
(a) A computer has 2048 MB of RAM.
How many GB of RAM does the computer have?
Show your working.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
..............................GB
[2]
(b) Describe one item that is stored in RAM.
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(c) Explain three ways that RAM is different to ROM.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
© UCLES 2017
2210/12/O/N/17
[Turn over
.
410
37
9
Anna has a farm that grows fruit.
She has a system that monitors the conditions for growing the fruit.
Sensors are used in this system.
(a) Explain what is meant by the term sensor.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) State two sensors that could be used in this system and describe how they could be used.
Sensor 1 ...................................................................................................................................
Use ...........................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Sensor 2 ...................................................................................................................................
Use ...........................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
© UCLES 2017
2210/12/O/N/17
.
411
38
10 (a) Describe what is meant by Transport Layer Security (TLS).
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(b) Name three different applications of TLS.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
© UCLES 2017
2210/12/O/N/17
[Turn over
.
412
39
11
Complete the paragraphs choosing the correct five terms from the list. Each term can only be
used once:
•
Ethics
•
Freeware
•
Free Software
•
Hacking
•
Malware
•
Plagiarism
•
Shareware
•
Virus
Taking another person’s work from the Internet and claiming it as your own is called
............................................. . It is possible to protect your work online with copyright.
One product that people may want to protect is software. ............................................. does allow
a person to share, copy and change software freely, but ............................................. does not
allow a person to do this legally. Software that has a licence allowing free use for a trial period
is called ............................................ . The name given to this area of Computer Science is
............................................. .
[5]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
© UCLES 2017
2210/12/O/N/17
.
440
Cambridge Assessment International Education
Cambridge Ordinary Level
COMPUTER SCIENCE
2210/12
Paper 1
October/November 2017
MARK SCHEME
Maximum Mark: 75
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2017 series for most
®
Cambridge IGCSE , Cambridge International A and AS Level components and some Cambridge O Level
components.
® IGCSE is a registered trademark.
This document consists of 9 printed pages.
© UCLES 2017
[Turn over
.
2210/12
Cambridge O Level – Mark Scheme
PUBLISHED
441
Question
1
Answer
1 mark per correct instruction:
October/November
2017
Marks
5
9 – LEFT
1 – DOWN
C – OPEN
3 – CLOSE
F – UP
Question
2
Answer
1 mark for each correct category:
Marks
6
HDD – Secondary
RAM – Primary
ROM – Primary
CD-ROM – Off-line
SSD – Secondary
DVD-RAM – Off-line
Question
3(a)
© UCLES 2017
Answer
Any four from (Max 2 per number system) :
Marks
4
•
•
A binary number system is a base-2 system
A denary number system is a base-10 system
•
•
A binary number system uses 0 and 1 values
A denary number system uses 0 to 9 values
•
•
A binary number system has units/ placeholders/column headings that increase by the power of 2
A denary number system has units/ placeholders/column headings that increase by the power of 10
•
Binary has more digit for the same value// Denary has less digits for the same value
Page 2 of 9
.
2210/12
Cambridge O Level – Mark Scheme
PUBLISHED
442
Question
3(b)
Answer
Five from:
• Correct column headings / place holders by example
• Correctly place a 1 or a 0 for each column
• Identify the columns to be added
• Add together the (denary) values identified «
• « this will give a total which is the denary number/answer
• Answer is 10
Question
Answer
4(a)(i)
Method 1
Serial
Parallel
Tick (9)
9
Method 2
© UCLES 2017
5
Marks
2
Tick (9)
Half-duplex
9
Any four from (Max 3 for serial):
• Serial has less/lower interference
• Serial is (more) reliable/accurate over distances
• In serial the bits won’t be skewed
• In serial it is easier to collate the bits together again after transmission
•
•
Marks
Simplex
Duplex
4(a)(ii)
October/November
2017
Duplex transmits data in both directions at the same time
simplex/half-duplex/remaining methods won’t allow read and write at same time
Page 3 of 9
4
2210/12
.
Cambridge O Level – Mark Scheme
PUBLISHED
443
Question
4(b)
October/November
2017
Answer
1 mark for error checking method, 2 marks for description:
Checksum
• A value is calculated from the data // Description of calculation
• Value is transmitted with data
• Value is recalculated after transmission
• If the values match the data is (more likely to be) accurate
Parity check
• A parity bit is transmitted with each byte of data
• Odd or even (parity can be used)
• Counts / checks number of 1’s // counts / checks to see if 1’s are even // counts / checks to see if 1’s are odd
• (Each byte is) checked after transmission to see if it matches the odd/even parity used
Automatic Repeat Request (ARQ)
• Uses acknowledgement and timeout
• When a device detects an error in data transmission it asks for the packet to be resent / no error detected, positive
acknowledgment sent
• The sending device resends the packet after the request to resend/ timeout received
• This process is continuous until the packet received is correct/until the ARQ limit is reached
Echo (check)
• Copy of data is sent back to sender
• Data is compared to see if it matches
• If it does not match error detected
© UCLES 2017
Page 4 of 9
Marks
6
.
2210/12
Cambridge O Level – Mark Scheme
PUBLISHED
444
Question
Answer
October/November
2017
Marks
5(a)
Any four from:
• Data / files
• Stored in a text file
• Downloaded to a user’s computer when a website is visited // webserver sends to web browser
• Stored on a user’s computer
• Stored by a browser
• Detected by the website when it is visited again
4
5(b)
Any two from: e.g.
• To store personal information/data
• To store login details
• To save items in an online shopping basket
• To track/save internet surfing habits // to track website traffic
• To carry out targeted advertising
• To store payment details
• To customise a webpage // to store user preferences
• Store progress in online games/quizzes
2
Question
6
© UCLES 2017
Answer
1 mark for each correct term, in this order:
• Interrupt
• Compiler
• ALU/Arithmetic and Logic Unit
• ARQ/Automatic repeat request
Marks
4
Page 5 of 9
2210/12
Question
7
© UCLES 2017
.
Cambridge O Level – Mark Scheme
PUBLISHED
445
Answer
1 mark for each correct logic gate with the correct input(s)
Page 6 of 9
October/November
2017
Marks
7
.
2210/12
Cambridge O Level – Mark Scheme
PUBLISHED
446
Question
8(a)
8(b)
8(c)
© UCLES 2017
October/November
2017
Answer
1 mark for correct calculation method, 1 mark for correct answer:
•
•
2048/1024 (or 1024 × 2)
2 GB
•
•
Instructions/programs/data
« currently in use
Marks
2
2
Any three from:
• RAM is volatile, ROM is non-volatile
• RAM is temporary, ROM is (semi) permanent
• RAM normally has a larger capacity than ROM
• RAM can be edited ROM cannot be edited // Data can be read from and written to RAM, ROM can only be read from.
Page 7 of 9
3
2210/12
.
Cambridge O Level – Mark Scheme
PUBLISHED
447
Question
9(a)
9(b)
Answer
•
•
It is an input device
It measures/takes (physical) readings of the surrounding environment / environment by example / physical properties
1 mark for each sensor, 2 marks for each description:
Marks
2
6
Moisture (sensor)
• To measure the water content of the soil
• To alert when the soil is too dry or too wet/needs watering
pH (sensor)
• To measure how acidic/alkaline the soil is
• To alert when there may be something polluting the soil
Light (sensor)
• To measure the brightness of the environment
• To alert when the fruit has too little/too much light
Temperature (sensor)
• To measure the temperature of the environment
• To alert when it is too hot/too cold for the fruit to grow
Gas (sensor)
• To measure the amount of CO2/oxygen present
• To alert when too much CO2/oxygen present
Humidity (sensor)
• To measure the water content in the air
• To alert when the air is too dry
Infra-red / motion (sensor)
• To measure level of infra-red/microwaves deflected
• To alert to any intruders e.g. animals stealing the fruit
© UCLES 2017
October/November
2017
Page 8 of 9
.
2210/12
Cambridge O Level – Mark Scheme
PUBLISHED
448
Question
Answer
October/November
2017
Marks
10(a)
Any three from:
• It is a (security) protocol
• It encrypts data (sent over the web/network)
• It is the updated version of SSL
• It has two layers
• It has a handshake layer
• It has a record layer
3
10(b)
1 mark for each correct application, examples could include:
• Online banking
• Online shopping // Online payment systems
• Email
• Cloud based storage
• Intranet/extranet
• VPN
• VoIP
• Instant messaging (IM) // social networking
3
Question
11
Answer
1 mark for each correct missing word, in the correct order:
•
•
•
•
•
© UCLES 2017
Plagiarism
Free software
Freeware
Shareware
Ethics
Page 9 of 9
Marks
5
.
449
Cambridge International Examinations
Cambridge Ordinary Level
2210/22
COMPUTER SCIENCE
Paper 2 Problem-solving and Programming
October/November 2017
PRE-RELEASE MATERIAL
No Additional Materials are required.
* 2 0 1 9 5 2 0 9 7 9 *
This material should be given to the relevant teachers and candidates as soon as it has been received
at the Centre.
READ THESE INSTRUCTIONS FIRST
Candidates should use this material in preparation for the examination. Candidates should attempt the
practical programming tasks using their chosen high-level, procedural programming language.
This document consists of 2 printed pages.
DC (LK) 150364
© UCLES 2017
[Turn over
.
2
450
In preparation for the examination candidates should attempt the following practical tasks by writing
and testing a program or programs.
The owner of a river boat hire company wants to calculate the daily profits from hiring out 10 rowing
boats on the river. Boats are numbered 1 to 10. Boats can be hired for use between 10:00 and 17:00
every day.
Write and test a program for the owner.
•
•
•
Your program must include appropriate prompts for the entry of data.
Error messages and other output need to be set out clearly and understandably.
All variables, constants and other identifiers must have meaningful names.
You will need to complete these three tasks. Each task must be fully tested.
TASK 1 – calculate the money taken in a day for one boat.
The cost of hiring a boat is $20 for one hour or $12 for half an hour. When a boat is hired the payment
is added to the money taken for the day. The running total of hours hired that day is updated and the
time when the boat must be returned is stored. At the end of the day the money taken and the total
hours hired is output.
No boat can be hired before 10:00 or returned after 17:00.
TASK 2 – find the next boat available.
Extend TASK 1 to work for all 10 rowing boats. Use the data stored for each boat to find out how many
boats are available for hire at the current time. If no boats are available show the earliest time that a
boat will be available for hire.
TASK 3 – calculate the money taken for all the boats at the end of the day.
At the end of the day use the data stored for each boat to calculate the total amount of money taken
and the total number of hours boats were hired that day. Find out how many boats were not used that
day and which boat was used the most. Provide a report for the owner to show this information.
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
© UCLES 2017
2210/22/PRE/O/N/17
.
451
Cambridge International Examinations
Cambridge Ordinary Level
* 7 5 7 6 9 3 0 3 8 4 *
2210/22
COMPUTER SCIENCE
Paper 2 Problem-solving and Programming
October/November 2017
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
Answer all questions.
DO NOT ATTEMPT TASKS 1, 2 AND 3 in the pre-release material; these are for information only.
You are advised to spend no more than 40 minutes on Section A (Question 1).
No marks will be awarded for using brand names of software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The maximum number of marks is 50.
This document consists of 10 printed pages and 2 blank pages.
DC (LK) 150363
© UCLES 2017
[Turn over
.
2
452
Section A
You are advised to spend no longer than 40 minutes answering this section.
Here is a copy of the pre-release material.
DO NOT attempt Tasks 1, 2 and 3 now.
Use the pre-release material and your experience from attempting the tasks before the examination to
answer Question 1.
Pre-release material
The owner of a river boat hire company wants to calculate the daily profits from hiring out 10 rowing
boats on the river. Boats are numbered 1 to 10. Boats can be hired for use between 10:00 and 17:00
every day.
Write and test a program for the owner.
•
•
•
Your program must include appropriate prompts for the entry of data.
Error messages and other output need to be set out clearly and understandably.
All variables, constants and other identifiers must have meaningful names.
You will need to complete these three tasks. Each task must be fully tested.
TASK 1 – calculate the money taken in a day for one boat.
The cost of hiring a boat is $20 for one hour or $12 for half an hour. When a boat is hired the payment
is added to the money taken for the day. The running total of hours hired that day is updated and the
time when the boat must be returned is stored. At the end of the day the money taken and the total
hours hired is output.
No boat can be hired before 10:00 or returned after 17:00.
TASK 2 – find the next boat available.
Extend TASK 1 to work for all 10 rowing boats. Use the data stored for each boat to find out how
many boats are available for hire at the current time. If no boats are available show the earliest time
that a boat will be available for hire.
TASK 3 – calculate the money taken for all the boats at the end of the day.
At the end of the day use the data stored for each boat to calculate the total amount of money taken
and the total number of hours boats were hired that day. Find out how many boats were not used
that day and which boat was used the most. Provide a report for the owner to show this information.
© UCLES 2017
2210/22/O/N/17
.
3
453
1
(a) All variables, constants and other identifiers should have meaningful names.
(i)
For one variable that you have used to record the information about a single boat in
Task 1, state the name, data type and its use.
Variable name ...................................................................................................................
Data type ...........................................................................................................................
Use ....................................................................................................................................
[3]
(ii)
State one constant and its value that you could have used for Task 1.
Constant name ..................................................................................................................
Value .................................................................................................................................
[2]
(b) Give two different validation checks you could have used for data entry in Task 1. For each
check explain why it could be used and provide a set of data for testing.
Validation check 1 .....................................................................................................................
...................................................................................................................................................
Reason for choice .....................................................................................................................
...................................................................................................................................................
Set of test data .........................................................................................................................
...................................................................................................................................................
Validation check 2 .....................................................................................................................
...................................................................................................................................................
Reason for choice .....................................................................................................................
...................................................................................................................................................
Set of test data .........................................................................................................................
...................................................................................................................................................
[6]
© UCLES 2017
2210/22/O/N/17
[Turn over
.
4
454
(c) Write an algorithm to complete Task 3, using either pseudocode, programming statements
or a flowchart. You may assume Task 2 has been completed.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
© UCLES 2017
2210/22/O/N/17
.
5
455
(d) Explain how your program finds out how many boats are available for hire (Task 2).
Any programming statements used must be fully explained.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
© UCLES 2017
2210/22/O/N/17
[Turn over
.
6
456
Section B
2
Write an algorithm using either pseudocode or a flowchart, to:
•
•
•
•
input a positive integer
use this value to set up how many other numbers are to be input
input these numbers
calculate and output the total and the average of these numbers.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
© UCLES 2017
2210/22/O/N/17
.
7
457
3
The following diagram shows four data structures and four descriptions.
Draw a line to connect each data structure to the correct description.
Data structure
Description
Constant
A collection of related data
Array
A value that can change whilst a
program is running
Table
A value that never changes whilst a
program is running
Variable
A series of elements of the same
data type
[3]
4
IF … THEN … ELSE … ENDIF is one type of conditional statement used when writing
pseudocode.
Identify and describe another type of conditional statement that you could use when writing
pseudocode. Give a reason why you would use this type of conditional statement.
Conditional statement ......................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Description .......................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Reason .............................................................................................................................................
..........................................................................................................................................................
[4]
© UCLES 2017
2210/22/O/N/17
[Turn over
.
8
458
5
(a) This flowchart checks a batch of 10 rice sacks for weight. Sacks should weigh 50 kilograms
each. Sacks weighing over 50.5 kilograms or less than 49.5 kilograms are rejected. The
number of sacks accepted and the number of sacks rejected is output.
START
0
0
0
Accept
Reject
Count
Is Count
= 10?
Accept
Accept + 1
Yes
OUTPUT
Accept,
Reject
No
Count
Count + 1
END
INPUT
Sack
Is Sack
< 49.5?
Yes
No
No
© UCLES 2017
Is Sack
> 50.5?
Yes
2210/22/O/N/17
Reject
Reject + 1
.
9
459
Complete the trace table for the input data:
50.4, 50.3, 49.1, 50.3, 50.0, 49.5, 50.2, 50.3, 50.5, 50.6
Accept
Reject
Count
Sack
OUTPUT
[5]
(b) The size of the batch has increased to 50 sacks. It has been decided to only reject sacks that
are underweight.
State the changes that need to be made to the flowchart.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
© UCLES 2017
2210/22/O/N/17
[Turn over
.
410
60
6
A database table, TRAIN, is to be set up for a railway company to keep a record of the engines
available for use. Each engine has a unique number made up of 5 digits, nnnnn. The engines
are classified as freight (F) or passenger (P) together with a power classification that is a whole
number between 0 and 9, for example F8. The railway company keeps a record of the date of the
last service for each engine.
(a) Identify the three fields required for the database. Give each field a suitable name and data
type. Provide a sample of data that you could expect to see in the field.
Field 1 Name ............................................................................................................................
Data type ..................................................................................................................................
Data sample .............................................................................................................................
Field 2 Name ............................................................................................................................
Data type ..................................................................................................................................
Data sample .............................................................................................................................
Field 3 Name ............................................................................................................................
Data type ..................................................................................................................................
Data sample .........................................................................................................................[6]
(b) State the field that you should choose as the primary key.
...............................................................................................................................................[1]
(c) Using the query-by-example grid below, write a query to identify all passenger engines that
have not been serviced in the past 12 months. Only display the engine numbers.
Field:
Table:
Sort:
Show:
Criteria:
or:
[3]
© UCLES 2017
2210/22/O/N/17
.
461
Cambridge Assessment International Education
Cambridge Ordinary Level
COMPUTER SCIENCE
2210/22
Paper 2
October/November 2017
MARK SCHEME
Maximum Mark: 50
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2017 series for most
®
Cambridge IGCSE , Cambridge International A and AS Level components and some Cambridge O Level
components.
® IGCSE is a registered trademark.
This document consists of 8 printed pages.
© UCLES 2017
[Turn over
.
2210/22
Cambridge O Level – Mark Scheme
PUBLISHED
462
Question
1(a)(i)
Answer
1 mark for appropriate variable name, 1 mark for appropriate data type, 1 mark for appropriate use.
October/November
2017
Marks
3
Many correct answers, they must be meaningful. These are examples only.
– HireTotal, integer, running total of money taken (for the day)
– HoursHired, real, running total of hours hired for the day
– Returned, real, hour and fraction of hour when next returned
1(a)(ii)
1 mark for appropriate constant name, 1 mark for appropriate value.
2
Many correct answers, they must be meaningful. These are examples only.
– HourPrice, 20.00
– HalfHourPrice 12.00
1(b)
1 mark for validation check, all checks must be different, 1 mark for the reason and 1 mark for the test data.
The only inputs for task 1 can be length of hire, money taken, time of hire and time of return.
There are many possible correct answers these are examples only.
Validation check
Reason
Test data
Validation check
Reason
Test data
© UCLES 2017
– range check for time of hire
– cannot be hired before 10:00 returned after 17:00
– 12:00, 19:00
– type check for money taken
– must be a numeric value
– 20.00, bob
Page 2 of 8
6
.
2210/22
Cambridge O Level – Mark Scheme
PUBLISHED
463
Question
1(c)
October/November
2017
Answer
–
any loop for 10 boats
Marks
(1 mark)
Four from:
– Initialisation
– check HoursHired against MaxHoursHired «
« store the BoatNumber
« update MaxHoursHired if greater
– check if HoursHired = 0 …
… if so add 1 to NumberBoatsUnused
– update daily totals (for hours and money)
– output report with messages (including totals for hours and money, and number of boats unused and the most used
boat).
Max 4 marks
Example:
MaxHoursHired Å 0
TotalHoursHired Å 0
TotalMoney Å 0
NumberBoatsUnused Å 0
FOR BoatNumber Å 1 to 10
TotalMoney Å TotalMoney + Money(BoatNumber)
TotalHoursHired Å TotalHoursHired + HoursHired(BoatNumber)
IF HoursHired(BoatNumber) = 0
THEN NumberBoatsUnused Å NumberBoatsUnused + 1
ENDIF
IF HoursHired(BoatNumber) > MaxHoursHired
THEN
MostUsed Å BoatNumber
MaxHoursHired Å HoursHired(BoatNumber)
ENDIF
NEXT BoatNumber
PRINT "Boats were hired for ", TotalHoursHired, " hours"
PRINT "Total amount of money taken was ", TotalMoney
PRINT NumberBoatsUnused, " boats were not used"
Print "Boat number ", MostUsed, " was used most"
© UCLES 2017
Page 3 of 8
5
.
2210/22
Cambridge O Level – Mark Scheme
PUBLISHED
464
Question
1(d)
October/November
2017
Answer
Maximum 4 marks in total for question part
4
e.g.
Explanation (may include reference to program statements)
– check all boats for«
– « return time < current time // current booking slot available or return time > current time// current booking slot not
available
– keep a running total of those available
– display number of boats
Example:
FOR BoatNumber Å 1 to 10
loop to check for all boats
IF ReturnTime(BoatNumber) <= CurrentTime check return time against current time
THEN BoatsAvailable Å BoatsAvailable + 1
keep a running total
ENDIF
NEXT BoatNumber
PRINT "Number of boats available ", BoatsAvailable
display number of boats
© UCLES 2017
Marks
Page 4 of 8
.
2210/22
Cambridge O Level – Mark Scheme
PUBLISHED
465
Question
2
Answer
1 mark for each, there may be other solutions, award full marks for any working solution
any six from:
initialise total (outside loop)
Input number of numbers (outside loop with validation)
Loop using input value
Input number (inside loop)
Update Total (inside loop)
Calculate average
Print average and total (outside loop)
Sample algorithm:
INPUT NumberCount
Total Å 0
FOR Count Å 1 TO NumberCount
INPUT Number
Total Å Total + Number
NEXT
Average Å Total/NumberCount
PRINT Total, Average
© UCLES 2017
Page 5 of 8
October/November
2017
Marks
6
.
2210/22
Cambridge O Level – Mark Scheme
PUBLISHED
466
Question
3
Answer
4
Marks
1 mark for each correct line, max 3 marks.
3
Data Structure
Description
Constant
A collection of related data.
Array
A value that can change whilst
a program is running.
Table
A value that never changes
whilst a program is running.
Variable
A series of elements of the
same data type.
Question
Answer
2 marks for identification, 1 mark for description, 1 mark for reason.
Identification:
CASE …
… OF … OTHERWISE … (ENDCASE)or
… OF … (OTHERWISE) … ENDCASE
Description:
– a statement that allows for multiple selections // not any of the above
Reason:
– to simplify pseudocode/ make pseudocode more understandable etc.
© UCLES 2017
October/November
2017
Page 6 of 8
Marks
4
.
2210/22
Cambridge O Level – Mark Scheme
PUBLISHED
467
Question
Answer
5(a)
Accept
Reject
Count
0
0
0
1
50.4
2
2
50.3
3
49.1
3
4
50.3
4
5
50.0
5
6
49.5
6
7
50.2
7
8
50.3
8
9
50.5
10
50.6
2
© UCLES 2017
Å
(1 mark)
ÆÅ
–
–
change to Is Count = 50?
remove IS Sack > 50.5?
(1 mark)
ÆÅ
(1 mark)
Marks
Sack
1
1
5(b)
October/November
2017
ÆÅ
(1 mark)
5
OUTPUT
82
ÆÅ
(1 mark)
Æ
2
Page 7 of 8
.
2210/22
Cambridge O Level – Mark Scheme
PUBLISHED
468
Question
6(a)
October/November
2017
Answer
–
Marks
1 mark for each field suitable name, 1 mark for appropriate data type and appropriate data sample
6
The following are examples there are many different correct answers.
–
–
–
6(b)
6(c)
–
Engine Number, text, 21012
Class, text, P6
Service Date, date, 4/3/2017
Engine Number // Correct field number
Field: Engine Number
Table: TRAIN
1
Class
Service Date
TRAIN
TRAIN
3
Sort:
Show:
;
Criteria:
†
Like ‘P*’ // Like ‘P?’
†
<10/11/2016
or:
(1 mark)
© UCLES 2017
(1 mark)
(1 mark)
Page 8 of 8
†
.
469
Iteach Cambridge International Examinations
Cambridge Ordinary Level
* 6 5 9 3 9 4 9 7 3 1 *
2210/12
COMPUTER SCIENCE
Paper 1 Theory
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
Answer all questions.
No marks will be awarded for using brand names of software packages or hardware.
Any businesses described in this paper are entirely fictitious.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The maximum number of marks is 75.
This document consists of 11 printed pages and 1 blank page.
DC (JM) 162278
© UCLES
[Turn over
.
2
470
1
Different units of data can be used to represent the size of a file, as it changes in size.
Fill in the missing units of data, using the list given:
•
byte
•
gigabyte (GB)
•
megabyte (MB)
•
nibble
The units of data increase in size from smallest to largest.
Smallest
bit
………………………………………………..
………………………………………………..
kilobyte (kB)
………………………………………………..
………………………………………………..
Largest
terabyte (TB)
[4]
2
(a) Nancy has captured images of her holiday with her camera. The captured images are stored
as digital photo files on her camera.
Explain how the captured images are converted to digital photo files.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
© UCLES 2018
2210/12/M/J/18
.
3
471
(b) Nancy wants to email the photos to Nadia.
Many of the photos are very large files, so Nancy needs to reduce their file size as much as
possible.
Identify which type of compression would be most suitable for Nancy to use. Explain your
choice.
Compression type .....................................................................................................................
Explanation ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
3
A stopwatch uses six digits to display hours, minutes and seconds.
The stopwatch is stopped at:
0 2
3 1
5 8
Hours
Minutes
Seconds
An 8-bit register is used to store each pair of digits.
(a) Write the 8-bit binary numbers that are currently stored for the Hours, Minutes and Seconds.
Hours
Minutes
Seconds
[3]
© UCLES 2018
2210/12/M/J/18
[Turn over
.
4
472
(b) The stopwatch is started again and then stopped.
When the watch is stopped, the 8-bit binary registers show:
Hours
0
0
0
0
0
1
0
1
Minutes
0
0
0
1
1
0
1
0
Seconds
0
0
1
1
0
1
1
1
Write the denary values that will now be shown on the stopwatch.
Hours
Minutes
Seconds
[3]
4
Jafar is using the Internet when he gets the message:
“D03, page is not available”
Jafar remembers that hexadecimal is often used to represent binary values in error codes.
Convert the hexadecimal number in the error message into 12-bit binary.
[3]
© UCLES 2018
2210/12/M/J/18
.
5
473
5
The three binary numbers in the registers X, Y and Z have been transmitted from one computer to
another.
Parity bit
Register X
1
0
0
1
0
0
1
0
Register Y
1
1
1
0
0
1
1
1
Register Z
1
1
1
0
1
0
0
1
Only one binary number has been transmitted correctly. This is identified through the use of a
parity bit.
Identify which register contains the binary number that has been transmitted correctly. Explain
the reason for your choice.
The binary number that has been transmitted correctly is in Register ............................................
Explanation ......................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[4]
© UCLES 2018
2210/12/M/J/18
[Turn over
.
6
474
6
Kelvin correctly answers an examination question about the Von Neumann model.
Eight different terms have been removed from his answer.
Complete the sentences in Kelvin’s answer, using the list given.
Not all items in the list need to be used.
•
accumulator (ACC)
•
address bus
•
arithmetic logic unit (ALU)
•
control unit (CU)
•
data bus
•
executed
•
fetches
•
immediate access store (IAS)
•
memory address register (MAR)
•
memory data register (MDR)
•
program counter (PC)
•
saved
•
transmits
The central processing unit (CPU) ....................................................................................
the data and instructions needed and stores them in the
.................................................................................... to wait to be processed.
The .................................................................................... holds the address of the next
instruction. This address is sent to the .................................................................................... .
The data from this address is sent to the .................................................................................... .
The instruction can then be decoded and .................................................................................... .
Any calculations that are carried out on the data are done by the
.................................................................................... . During calculations, the data is temporarily
held in a register called the .................................................................................... .
[8]
© UCLES 2018
2210/12/M/J/18
.
7
475
7
Consider the logic statement:
X = 1 if ((A is 1 AND B is NOT 1) NAND C is 1) XOR ((A is 1 AND C is 1) OR B is 1)
(a) Draw a logic circuit to represent the given logic statement.
A
B
X
C
[6]
(b) Complete the truth table for the given logic statement.
A
B
C
0
0
0
0
0
1
0
1
0
0
1
1
1
0
0
1
0
1
1
1
0
1
1
1
Working space
X
[4]
© UCLES 2018
2210/12/M/J/18
[Turn over
.
8
476
8
Dimitri is writing a computer program in a high-level language.
He needs to send just the machine code for the program to his friend, electronically.
It is important that the program is executed as quickly as possible.
Identify which translator will be most suitable for Dimitri to use. Explain your choice.
Type of translator .............................................................................................................................
Explanation ......................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[4]
9
An advertisement in a magazine displays this barcode:
(a) Identify this type of barcode.
.............................................................................................................................................. [1]
(b) Explain how the data stored in this barcode is read.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
© UCLES 2018
2210/12/M/J/18
.
9
477
10 Alexandra has a new mobile device.
It has a touch screen that uses capacitive technology.
(a) Describe how a capacitive touch screen registers Alexandra’s touch.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
(b) Alexandra is wearing gloves because it is cold.
She presses an icon on her touch screen but her action is not registered.
(i)
Explain why the touch screen will not register her touch.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [2]
(ii)
Alexandra does not want to remove her gloves.
Explain how Alexandra could use her mobile device whilst still wearing gloves.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [2]
© UCLES 2018
2210/12/M/J/18
[Turn over
.
410
78
11
A factory uses a security system to control a security light. The system uses a sensor and a
microprocessor.
Explain how the security system makes use of the sensor and the microprocessor to control the
security light.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [6]
© UCLES 2018
2210/12/M/J/18
.
411
79
12 (a) Selma has some important personal information that she needs to email to her employer.
She wants to make sure that if the personal information is intercepted, it cannot be understood.
(i)
State how Selma could email her personal data more securely.
...................................................................................................................................... [1]
(ii)
Describe how your chosen solution works.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [5]
(b) Selma wants to make sure that the information received is correct.
A parity check can be used to detect errors.
Describe another error detection method that can be used to check the information received
is correct.
Error detection method .............................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
© UCLES 2018
2210/12/M/J/18
.
480
Cambridge Assessment International Education
Cambridge Ordinary Level
COMPUTER SCIENCE
2210/12
Paper 1
May/June 2018
MARK SCHEME
Maximum Mark: 75
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2018 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and
some Cambridge O Level components.
IGCSE™ is a registered trademark.
This document consists of 10 printed pages.
© UCLES 2018
[Turn over
2210/12
.
Cambridge O Level – Mark Scheme
PUBLISHED
481
Generic Marking Principles
May/June 2018
These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.
GENERIC MARKING PRINCIPLE 1:
Marks must be awarded in line with:
•
•
•
the specific content of the mark scheme or the generic level descriptors for the question
the specific skills defined in the mark scheme or in the generic level descriptors for the question
the standard of response required by a candidate as exemplified by the standardisation scripts.
GENERIC MARKING PRINCIPLE 2:
Marks awarded are always whole marks (not half marks, or other fractions).
GENERIC MARKING PRINCIPLE 3:
Marks must be awarded positively:
•
•
•
•
•
marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
marks are awarded when candidates clearly demonstrate what they know and can do
marks are not deducted for errors
marks are not deducted for omissions
answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.
GENERIC MARKING PRINCIPLE 4:
Rules must be applied consistently e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.
© UCLES 2018
Page 2 of 10
2210/12
GENERIC MARKING PRINCIPLE 5:
.
Cambridge O Level – Mark Scheme
PUBLISHED
482
May/June 2018
Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).
GENERIC MARKING PRINCIPLE 6:
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.
© UCLES 2018
Page 3 of 10
.
2210/12
Cambridge O Level – Mark Scheme
PUBLISHED
483
Question
1
Answer
1 mark for each unit, in the given order:
–
–
nibble
byte
–
–
megabyte (MB)
gigabyte (GB)
May/June 2018
Marks
4
Question
Answer
Marks
2(a)
Any four from:
– Image is converted from analogue to digital (using ADC)
– Image is turned into pixels
– Each pixel is given a binary value
– Pixels form a grid (to create the image)
– Each pixel has a colour
– Pixels are stored in sequence (in a file)
– Meta data is stored (to describe the dimensions/resolution of the image) // It stores the dimensions/colour
depth .etc.
– An example of a suitable photo file format e.g. JPEG
4
2(b)
1 mark for correct compression, 3 marks for explanation:
4
–
Lossy
Any three from:
– Lossy would reduce the file size more (than lossless)
– The redundant data can be removed from the files // by example (must be about redundant data)
– Images can still be a similar quality
– There is no requirement for the files to be exactly the same as original file
– Photos can be sent quicker // faster to upload // faster to download
© UCLES 2018
Page 4 of 10
.
2210/12
Cambridge O Level – Mark Scheme
PUBLISHED
484
Question
3(a)
3(b)
Answer
3
Hours
0
0
0
0
0
0
1
0
Minutes
0
0
0
1
1
1
1
1
Seconds
0
0
1
1
1
0
1
0
1 mark for each correct section:
3
5
2
Hours
6
5
Minutes
Question
5
Seconds
Answer
Marks
1 mark for each correct section:
1
1
0
1 mark
© UCLES 2018
Marks
1 mark for each correct register
0
4
May/June 2018
1
3
0
0
0
0
1 mark
0
0
1
1 mark
Page 5 of 10
1
.
2210/12
Cambridge O Level – Mark Scheme
PUBLISHED
485
Question
5
Answer
1 mark for correct register, 3 marks for reason:
–
May/June 2018
Marks
4
Register Y
Any three from:
– Count the number of 1/0 bits (in each byte/register)
– Two bytes/registers have an odd number of 1/0 bits // Two have odd parity
– Even parity must be the parity used
– One byte/register has an even number of 1/0 bits // One uses even parity
– The two with an odd number of one bits/odd parity are incorrect // Register X and Z should have even parity
Question
6
Answer
1 mark for each correct missing word, in the given order:
–
–
–
–
–
–
–
–
© UCLES 2018
fetches
immediate access store // IAS
program counter // PC
memory address register // MAR
memory data register // MDR
executed
arithmetic logic unit // ALU
accumulator // ACC
Page 6 of 10
Marks
8
.
2210/12
Cambridge O Level – Mark Scheme
PUBLISHED
486
Question
Answer
May/June 2018
Marks
7(a)
1 mark for each correct logic gate with correct direct of input(s):
6
7(b)
4 marks for 8 correct outputs
3 marks for 6 or 7 correct outputs
2 marks for 4 or 5 correct outputs
1 mark for 2 or 3 correct outputs
4
© UCLES 2018
A
B
C
Working space
X
0
0
0
1
0
0
1
1
0
1
0
0
0
1
1
0
1
0
0
1
1
0
1
1
1
1
0
0
1
1
1
0
Page 7 of 10
.
2210/12
Cambridge O Level – Mark Scheme
PUBLISHED
487
Question
8
Answer
1 mark for correct translator, 3 marks for explanation:
–
May/June 2018
Marks
4
Compiler
Any three from:
– Does not require recompilation // compiled program can be executed without a compiler «
– ... therefore, allows faster execution
– Provides an executable file «
– « therefore, allows him to just send machine code
– Dimitri’s friend does not need translation/compilation software to execute the program
Question
Answer
Marks
9(a)
QR/Quick response
1
9(b)
Any four from:
– Read/scanned using app (on mobile device)
– It is the camera that is used to scan/capture the image
– The three large squares are used to define the alignment // uses alignment targets/modules
– Black squares reflect less light // white squares reflect more light
– The app/device processes the image
– Each small square/pixel is converted to a binary value
4
Question
10(a)
© UCLES 2018
Answer
Any four from:
– Conductive layer
– An electrostatic/electric field is created
– Sensor(s) (around the screen) monitor the electrostatic field
– When touched (electrostatic) charge is transferred to finger
– Location of touch is calculated // Co-ordinates used to calculate touch
Page 8 of 10
Marks
4
.
2210/12
Cambridge O Level – Mark Scheme
PUBLISHED
488
Question
Answer
May/June 2018
Marks
10(b)(i)
Any two from:
– Gloves are not conductive // Gloves are an insulator
– Block current/charge from finger / body / person
– Stop the electrostatic field being disturbed/changed
2
10(b)(ii)
Any two from e.g. (1 mark for method, 1 for expansion):
– She could use a (conductive) stylus«
– « this will allow the charge to be charged/disturbed
2
–
–
She could use capacitive gloves«
« this will allow the charge to be charged/disturbed
–
–
She could use a natural language interface/voice operated interface «
« she could give vocal commands to the device
Question
11
Answer
Any six from:
– Suitable sensor (motion/infra-red)
– Data converted (from analogue) to digital (using ADC)
– Data sent to microprocessor
– Data is compared to stored value/range «
– « if data matches/out of range data security light turned on «
– « waits for suitable period/until no motion detected «
– « light turned off
– Continuous loop/process
Question
12(a)(i)
© UCLES 2018
Answer
Encryption
Marks
6
Marks
1
Page 9 of 10
.
2210/12
Cambridge O Level – Mark Scheme
PUBLISHED
489
Question
12(a)(ii)
12(b)
Answer
Marks
Any five from:
– Her personal details before encryption is the plain text
– The plain text/her personal details is encrypted using an encryption algorithm
– The plain text/her personal details is encrypted using a key
– The encrypted text is cypher/cipher text
– The key is transmitted separately (from the text)
– The key is used to decrypt the cypher text (after transmission)
5
Any three from a single error method:
– Checksum
– Calculation carried out on data
– (checksum/calculated) value sent with data
– recalculated after transmission and compared to original
– If they do not match an error is present
3
–
–
–
–
–
© UCLES 2018
May/June 2018
ARQ
uses acknowledgment and timeout
A request is sent with data to acknowledge all data is received
Acknowledgement sent back to say all data is received
If no acknowledgement is received in a time frame an error in transmission detected / data automatically resent.
Page 10 of 10
.
490
Cambridge International Examinations
Cambridge Ordinary Level
* 6 4 3 3 3 4 7 1 7 2 *
2210/22
COMPUTER SCIENCE
Paper 2 Problem-solving and Programming
May/June 2018
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
Answer all questions.
DO NOT ATTEMPT TASKS 1, 2 AND 3 in the pre-release material; these are for information only.
You are advised to spend no more than 40 minutes on Section A (Question 1).
No marks will be awarded for using brand names of software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The maximum number of marks is 50.
This document consists of 11 printed pages and 1 blank page.
DC (KS) 160594
© UCLES 2018
[Turn over
.
2
491
Section A
You are advised to spend no longer than 40 minutes answering this section.
Here is a copy of the pre-release material.
DO NOT attempt Tasks 1, 2 and 3 now.
Use the pre-release material and your experience from attempting the tasks before the examination to
answer Question 1.
Pre-release material
A farmer records the milk production of a herd of cows. Every cow has a unique 3-digit identity
code. Each cow can be milked twice a day, seven days a week. The volume of milk from each cow
is recorded in litres correct to one decimal place (yield) every time the cow is milked. The size of the
herd is fixed. At the end of the week the total and the average yield for each cow for that week is
calculated.
The farmer identifies the cow that has produced the most milk that week. The farmer also identifies
any cows that have produced less than 12 litres of milk on four or more days that week.
A program is required to record the yield for each cow every time it is milked, calculate the total
weekly volume of milk for the herd and the average yield per cow in a week. The program must also
identify the cow with the best yield that week and identify any cows with a yield of less than 12 litres
of milk for four or more days that week.
Write and test a program or programs for the farmer.
•
•
•
Your program or programs must include appropriate prompts for the entry of data.
Error messages and other output need to be set out clearly and understandably.
All variables, constants and other identifiers must have meaningful names.
You will need to complete these three tasks. Each task must be fully tested.
TASK 1 – Record the yield.
Write a program for TASK 1 to record the milk yields for a week. The program records and stores the
identity code number and the yield every time a cow is milked.
TASK 2 – Calculate the statistics.
Using your recorded data from TASK 1, calculate and display the total weekly volume of milk for
the herd to the nearest whole litre. Calculate and display the average yield per cow in a week to the
nearest whole litre.
TASK 3 – Identify the most productive cow and cows that are producing a low volume of milk.
Extend TASK 2 to identify and display the identity code number and weekly yield of the cow that has
produced the most milk. Also identify and display the identity code numbers of any cows with a yield
of less than 12 litres of milk for four days or more in the week.
© UCLES 2018
2210/22/M/J/18
.
3
492
1
(a) All variables, constants and other identifiers should have meaningful names.
(i)
State the name, the data type and the use of two variables that you have used in Task 2.
Variable 1 name ................................................................................................................
Data type ...........................................................................................................................
Use ....................................................................................................................................
Variable 2 name ................................................................................................................
Data type ...........................................................................................................................
Use ....................................................................................................................................
[2]
(ii)
Describe, with the aid of some sample data, the data structures that you have used to
record the data for the cows in Task 1.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[4]
(b) Explain how your program for Task 1 ensures that each 3-digit identity code is unique.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
© UCLES 2018
2210/22/M/J/18
[Turn over
.
4
493
(c) Write an algorithm for Task 2, using either pseudocode, programming statements or a
flowchart. Assume that Task 1 has been completed.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
© UCLES 2018
2210/22/M/J/18
.
5
494
(d) (i)
Explain how your program for Task 3 finds the cows with a daily yield of less than
12 litres of milk for four days or more in the week. Any programming statements used in
your answer must be fully explained.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[5]
(ii)
Explain how you would extend your program for Task 3 to store the identity code
number(s) of those cows with a yield of less than 12 litres of milk for four days or more in
the week.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
© UCLES 2018
2210/22/M/J/18
[Turn over
.
6
495
Section B
2
(a) Draw a flowchart for an algorithm to input numbers. Reject any numbers that are negative
and count how many numbers are positive. When the number zero is input, the process ends
and the count of positive numbers is output.
[6]
© UCLES 2018
2210/22/M/J/18
.
7
496
(b) Explain the changes you will make to your algorithm to also count the negative numbers.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
Question 3 starts on Page 8.
© UCLES 2018
2210/22/M/J/18
[Turn over
.
8
497
3
This pseudocode algorithm inputs two non-zero numbers and a sign, and then performs the
calculation shown by the sign. An input of zero for the first number terminates the process.
INPUT
WHILE
IF
IF
IF
IF
IF
Number1, Number2, Sign
Number1 <> 0
Number1 + Number2
Sign = '+' THEN Answer
Number1 - Number2
Sign = '-' THEN Answer
Number1 * Number2
Sign = '*' THEN Answer
Number1 / Number2
Sign = '/' THEN Answer
Sign <> '/' AND Sign <> '*' AND Sign <> '-'
0
THEN Answer
ENDIF
IF Answer <> 0 THEN OUTPUT Answer ENDIF
INPUT Number1, Number2, Sign
ENDWHILE
ENDIF
ENDIF
ENDIF
ENDIF
AND Sign <> '+'
(a) Complete the trace table for the input data:
5, 7, +, 6, 2, –, 4, 3, , 7, 8, ?, 0, 0, /
*
Number1
Number2
Sign
Answer
OUTPUT
[3]
(b) Show how you could improve the algorithm written in pseudocode by writing an alternative
type of conditional statement in pseudocode.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
© UCLES 2018
2210/22/M/J/18
.
9
498
4
A programmer has written a routine to store the name, email address and password of a contributor
to a website’s discussion group.
(a) The programmer has chosen to verify the name, email address and password.
Explain why verification was chosen and describe how the programmer would verify this data.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) The programmer has also decided to validate the email address and the password.
Describe validation checks that could be used.
Email address ............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Password ..................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
© UCLES 2018
2210/22/M/J/18
[Turn over
.
410
99
5
A program checks that the weight of a basket of fruit is over 1.00 kilograms and under
1.10 kilograms. Weights are recorded to an accuracy of two decimal places and any weight not in
this form has already been rejected.
Give three weights as test data and for each weight state a reason for choosing it. All your reasons
must be different.
Weight 1 ............................................................................................................................................
Reason ..............................................................................................................................................
..........................................................................................................................................................
Weight 2 ............................................................................................................................................
Reason ..............................................................................................................................................
..........................................................................................................................................................
Weight 3 ............................................................................................................................................
Reason ..............................................................................................................................................
..........................................................................................................................................................
[3]
© UCLES 2018
2210/22/M/J/18
.
511
00
6
A database table, TREES, is used to keep a record of the trees in a park. Each tree is given a
unique number and is examined to see if it is at risk of dying. There are over 900 trees; part of the
database table is shown.
Tree Number
Type
Map Position
Age in Years
At Risk
TN091
Acacia
A7
250
Y
TN172
Olive
C5
110
N
TN913
Cedar
B9
8
N
TN824
Banyan
A3
50
Y
TN021
Pine
D5
560
Y
TN532
Teak
C8
76
Y
TN043
Yew
B1
340
N
TN354
Spruce
D4
65
N
TN731
Elm
B10
22
Y
TN869
Oak
C9
13
N
TN954
Pine
E11
3
N
(a) State the number of fields in the table.
...............................................................................................................................................[1]
(b) The tree numbering system uses TN followed by three digits. The numbering system will not
work if there are over 1000 trees.
Describe, with the aid of an example, how you could change the tree numbering system to
allow for over 1000 trees. Existing tree numbers must not be changed.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(c) Using the query-by-example grid, write a query to identify at risk trees over 100 years old.
Display only the type and the position on the map.
Field:
Table:
Sort:
Show:
Criteria:
or:
[4]
© UCLES 2018
2210/22/M/J/18
.
501
Cambridge Assessment International Education
Cambridge Ordinary Level
COMPUTER SCIENCE
2210/22
Paper 2
May/June 2018
MARK SCHEME
Maximum Mark: 50
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2018 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and
some Cambridge O Level components.
IGCSE™ is a registered trademark.
This document consists of 7 printed pages.
© UCLES 2018
[Turn over
2210/22
.
Cambridge O Level – Mark Scheme
PUBLISHED
502
May/June 2018
Generic Marking Principles
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
GENERIC MARKING PRINCIPLE 1:
Marks must be awarded in line with:
•
•
•
the specific content of the mark scheme or the generic level descriptors for the question
the specific skills defined in the mark scheme or in the generic level descriptors for the question
the standard of response required by a candidate as exemplified by the standardisation scripts.
GENERIC MARKING PRINCIPLE 2:
Marks awarded are always whole marks (not half marks, or other fractions).
GENERIC MARKING PRINCIPLE 3:
Marks must be awarded positively:
•
•
•
•
•
marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
marks are awarded when candidates clearly demonstrate what they know and can do
marks are not deducted for errors
marks are not deducted for omissions
answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
GENERIC MARKING PRINCIPLE 4:
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
GENERIC MARKING PRINCIPLE 5:
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
GENERIC MARKING PRINCIPLE 6:
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
© UCLES 2018
Page 2 of 7
.
2210/22
Cambridge O Level – Mark Scheme
PUBLISHED
503
Question
May/June 2018
Answer
Marks
Section A
1(a)(i)
Variable name, data type and use one mark, max two
Several correct answers, the names chosen must be meaningful. Variables must
relate to task 2
Example
Name
Data type
Use
Name
Data type
Use
1(a)(ii)
2
totalMilk
integer/real
to store the total volume of the milk for the week (to the nearest
whole litre) (1)
weeklyAverage
integer/real
to store the average yield per week (1)
One mark per bullet point.
• Data structure(s) given (1)
• Data type (1)
• Sample data (1)
• More than one data structure described (1)
4
Example
A real array for each milking and an array of strings for the identity codes. There
would be 14 arrays for the milking e.g. mondayMorning, mondayEvening
Sample data for a cow could be 123, 23.5, 22.7
1(b)
Entering/selecting the identity code (1) method to ensure it is not a duplicate (1)
Example
Enter new identity code number
Check if already in the list of code numbers
© UCLES 2018
Page 3 of 7
2
2210/22
Question
1(c)
.
Cambridge O Level – Mark Scheme
PUBLISHED
504
May/June 2018
Answer
Any five from:
1 Initialisation for total weekly volume
2 loop control
3 calculation of running total for yield
4 calculation of average yield
5 output total and average yield per week with message outside loop
6 value(s) rounded
Marks
5
Sample answer
total ← 0
FOR counter ← 1 TO numCows
total ← total + mondayMorning(counter)
total ← total + mondayEvening(counter)
total ← total + tuesdayMorning(counter)
total ← total + tuesdayEvening (counter)
total ← total + wednesdayMorning(counter)
total ← total + wednesdayEvening (counter)
total ← total + thursdayMorning(counter)
total ← total + thursdayEvening (counter)
total ← total + fridayMorning(counter)
total ← total + fridayEvening (counter)
total ← total + saturdayMorning(counter)
total ← total + saturdayEvening (counter)
total ← total + sundayMorning(counter)
total ← total + sundayEvening(counter)
NEXT counter
Average ← ROUND(total/numCows)
OUTPUT "Total volume of milk for week ", ROUND(total)
OUTPUT "Average weekly yield ", average
1(d)(i)
Explanation
Any five from:
1 Check each cow
2 Initialise day counter to zero
3 Check every day of the week
4 If daily yield is less than 12
5
add one to day counter
6 If day counter >= 4
7
identify/output identity code number(s)
5
1(d)(ii)
Explanation
• Add new storage space to store code numbers for example new
array/table/list
• Add extra code to store these values if the condition was met
2
© UCLES 2018
Page 4 of 7
.
2210/22
Cambridge O Level – Mark Scheme
PUBLISHED
505
Question
May/June 2018
Answer
Marks
Section B
2(a)
One mark per correct pair of actions, process, Input/Output, Tests (apart from
START and END) max 3
One mark complete Flowlines, one mark working flowlines, one mark correct use
flowchart symbols
6
START
Count
←
0
INPUT
Number
Is
Number
= 0?
Yes
No
Yes
Is
Number
< 0?
No
Count
2(b)
© UCLES 2018
OUTPUT Count, "
positive
numbers"
← Count + 1
END
Any two from:
• Use another counter/variable
• Update this counter/variable when the number is less than zero/count all
numbers and subtract the positive numbers
• Output this counter/variable at the end // Output both counters at the end
Page 5 of 7
2
.
2210/22
Cambridge O Level – Mark Scheme
PUBLISHED
506
Question
3(a)
Answer
Number1 Number2 Sign
Å
3(b)
Question
4(a)
May/June 2018
Marks
Answer
OUTPUT
5
7
+
12
12
6
2
-
4
4
4
3
*
12
12
7
8
?
0
0
0
/
(0)
1 mark
Æ Å 1 mark
Æ Å 1 mark
3
Æ
CASE Sign OF
ENDCASE (1)
List +, -, *, / with correct assignments (1)
OTHERWISE Answer ← 0 (1)
Example
CASE Sign OF
ꞌ+ꞌ : Answer ← Number1 + Number2
ꞌ-ꞌ : Answer ← Number1 - Number2
ꞌ*ꞌ : Answer ← Number1 * Number2
ꞌ/ꞌ : Answer ← Number1 / Number2
OTHERWISE Answer ← 0
ENDCASE
Answer
Max 4 in total
Any 3 from:
• To ensure no changes are made on input / accuracy of transcription
• Because the details do not have fixed, values or lengths to validate
• Because there is no clear set of rules that can be used for validation
3
Marks
4
Any 3 from:
• The programmer could ask the contributor to type in each detail twice
•
and then check that both values are equal
•
If they are not equal then the input should be rejected
• The programmer could ask the contributor to check the details on the
screen
•
and confirm that they are correct / same as the original
•
or change them
4(b)
One mark for email and one mark for password
Email – check for @ / format check / no spaces /valid characters // presence
check // length check (not more than 254 characters) // uniqueness check
Password – length check / numbers and letters etc. // uniqueness check not been
used before // presence check
© UCLES 2018
Page 6 of 7
2
.
2210/22
Cambridge O Level – Mark Scheme
PUBLISHED
507
Question
5
May/June 2018
Answer
Marks
One mark per value and reason, max 3
Example
1.00 – boundary rejected//rejected (underweight) // out of range(1)
1.02 – normal // valid // accepted weight in range (1)
1.10 – abnormal // erroneous // invalid // rejected (overweight) (1)
Question
3
Answer
Marks
6(a)
Fields
5
6(b)
One mark description of new code that will allow more than 1000 values
One mark for example matching candidate’s description
1
2
Example
Use a new character instead of N
TT345
6(c)
Field: At Risk
Table: TREES
Age in Years
Type
Map Position
TREES
TREES
TREES
Sort:
Show:
†
Criteria: True
†
>100
or:
One mark per correct column
© UCLES 2018
Page 7 of 7
;
;
4
.
508
Cambridge International Examinations
Cambridge Ordinary Level
* 1 6 9 9 0 2 9 4 0 9 *
2210/22
COMPUTER SCIENCE
Paper 2 Problem-solving and Programming
October/November 2018
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
Answer all questions.
DO NOT ATTEMPT TASKS 1, 2 AND 3 in the pre-release material; these are for information only.
You are advised to spend no more than 40 minutes on Section A (Question 1).
No marks will be awarded for using brand names of software packages or hardware.
Any businesses described in this paper are entirely fictitious.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The maximum number of marks is 50.
This document consists of 11 printed pages and 1 blank page.
DC (SC) 173734
© UCLES 2018
[Turn over
.
2
509
Section A
You are advised to spend no longer than 40 minutes answering this section.
Here is a copy of the pre-release material.
DO NOT attempt Tasks 1, 2 and 3 now.
Use the pre-release material and your experience from attempting the tasks before the examination to
answer Question 1.
Pre-release material
A junior park run event is held every week on a Saturday morning in a local park over a distance of
two kilometres. Children between the ages of 4 and 14 inclusive can register to take part. Children
register with their name and age. When they register, they are allocated a unique identification
number of four digits; the last digit is a check digit. Once registered a child can take part in junior
park run events for a year.
For each event, the organisers record the time each child takes to run two kilometres. Their time is
stored for every event they complete and the number of runs they have completed is updated by
one. If their time is faster than their personal best (PB) time, their PB time is updated. When a child
has completed 11 runs, they are awarded a half-marathon wristband. When a child has completed
22 runs, they are awarded a full-marathon wristband.
A program is required to update the children’s data, update PB times if necessary, and decide if a
wristband is to be awarded. The program also needs to identify the fastest child at this event for
each of the age ranges: 4 to 6, 7 to 10 and 11 to 14.
Write and test a program or programs for the park run organiser.
•
•
•
Your program or programs must include appropriate prompts for the entry of data.
Error messages and other output need to be set out clearly and be understandable.
All variables, arrays, constants and other identifiers must have meaningful names.
You will need to complete these three tasks. Each task must be fully tested.
TASK 1 – Registering to take part.
Write a program to set up arrays to store the data for 20 children. On registration, each child must
be allocated a unique identification number of four digits; the last digit is a check digit. The unique
identification number, age in years and name for each child is recorded and stored on registration.
The PB time and the number of runs are initialised to zero and these values stored on registration.
Their PB time is stored as minutes correct to two decimal places.
TASK 2 – Recording the times.
Extend your program to record the unique identification number and to input the start time and finish
time for every child completing the junior park run event. Calculate and store the time each child
took to complete the run. A registered child does not have to compete in each event. Only one time
per child is recorded during an event.
TASK 3 – Updating the children’s data and identifying the fastest child for each age range.
Extend your program to update the number of runs and the PB time if necessary for every child
completing the junior park run event. Check if any half- or full-marathon wristbands need to be
awarded. Output the names and the type of wristbands. Output the names and the times of the
fastest child at this event for each of the age ranges 4 to 6, 7 to 10 and 11 to 14.
© UCLES 2018
2210/22/O/N/18
.
3
510
1
(a) All variables, arrays, constants and other identifiers should have meaningful names.
(i)
State the name of one variable you have used for Task 3.
Give the data type for the variable. State what it is used for.
Variable name ...................................................................................................................
Data type ...........................................................................................................................
Use ....................................................................................................................................
[3]
(ii)
Describe the arrays that you have used to store the data for the children in Task 1.
Include the name, data type and its use for each array.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [5]
(b) Explain how you ensured that each identification number entered in Task 1 was unique and
included a correct check digit.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
© UCLES 2018
2210/22/O/N/18
[Turn over
.
4
511
(c) Write an algorithm for Task 2, using either pseudocode, programming statements or a
flowchart. You should assume that Task 1 has already been completed.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
© UCLES 2018
2210/22/O/N/18
.
5
512
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
© UCLES 2018
2210/22/O/N/18
[Turn over
.
6
513
(d) Explain how your program identifies and outputs the names and times of the fastest runner
for each age range in Task 3. Any programming statements used in your answer must be
fully explained. Do not include the wristband check or PB time update.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
© UCLES 2018
2210/22/O/N/18
.
7
514
Section B
2
(a) Write an algorithm, using pseudocode, to input three different numbers, multiply the two
larger numbers together and output the result. Use the variables: Number1, Number2 and
Number3 for your numbers and Answer for your result.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [5]
(b) Give two sets of test data to use with your algorithm in part (a) and explain why you chose
each set.
Test data set 1 ..........................................................................................................................
Reason .....................................................................................................................................
...................................................................................................................................................
Test data set 2 ..........................................................................................................................
Reason .....................................................................................................................................
...................................................................................................................................................
[4]
© UCLES 2018
2210/22/O/N/18
[Turn over
.
8
515
3
Four programming concepts and four descriptions are shown.
Draw a line to connect each programming concept to the most appropriate description.
Programming concept
Description
Library routine
A subroutine that does not
have to return a value.
Structure
diagram
A standard subroutine that is
available for immediate use.
Procedure
A subroutine that always
returns a value.
Function
An overview of a program or
subroutine.
[3]
4
A programmer wants to test that the readings from 2000 electricity meters are greater than 400
units and less than 900 units. The programmer uses selection and repetition statements as part of
the program.
Explain, using programming statements, how selection and repetition could be used in this
program.
Selection ..........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Repetition .........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[4]
© UCLES 2018
2210/22/O/N/18
.
9
516
BLANK PAGE
Question 5 starts on page 10.
© UCLES 2018
2210/22/O/N/18
[Turn over
.
510
17
5
The flowchart checks the level of chlorine and the depth of water compared to the height of the
swimming pool. Error messages are output if a problem is found.
START
INPUT Height,
Depth, Chlorine
OK
True
Is Depth >
Height/2 ?
OUTPUT
"Water too
deep"
Yes
No
Is Depth <
Height/3 ?
OUTPUT
"Water too
shallow"
Yes
No
Is Chlorine
>3 ?
OK
Yes
False
OUTPUT "Too
much chlorine
add more water"
No
Is Chlorine
<1 ?
Yes
OUTPUT "Too
little chlorine
add more chlorine"
No
No
Is OK = True ?
Yes
OUTPUT "Pool OK
to use"
END
© UCLES 2018
2210/22/O/N/18
.
511
18
(a) Complete the trace tables for each set of input data.
Input data: 6, 2.5, 2
Height
Depth
Chlorine
OK
OUTPUT
Chlorine
OK
OUTPUT
Chlorine
OK
OUTPUT
Input data: 4, 3, 1.5
Height
Depth
Input data: 6, 3.5, 4
Height
Depth
[6]
(b) Identify a problem with the algorithm that the flowchart represents.
...................................................................................................................................................
.............................................................................................................................................. [1]
© UCLES 2018
2210/22/O/N/18
[Turn over
.
512
19
6
A database table, PORTRAIT, is used to keep a record of the portraits available from a photographic
studio. Each portrait has a unique reference number PICnnn, where n is a single digit, for example
PIC123. The studio keeps a record of the size (for example 20 × 15), the type (black and white or
colour), and the price in dollars.
(a) Complete the table to show the most appropriate data type for each of the fields.
Field
Data type
Reference Number
Size
Type
Price in $
[4]
(b) The results from the query-by-example grid should show the reference number, price, type
and size of all portraits under $50. Identify the three errors in the query-by-example grid.
Field:
Reference No
Price in $
Type
Size
Table:
PORTRAIT
PORTRAIT
PORTRAIT
PORTRAIT
Sort:
Show:
Criteria:



>50.00
or:
Error 1 .......................................................................................................................................
...................................................................................................................................................
Error 2 .......................................................................................................................................
...................................................................................................................................................
Error 3 .......................................................................................................................................
...................................................................................................................................................
[3]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
© UCLES 2018
2210/22/O/N/18
.
520
Cambridge International Examinations
Cambridge Ordinary Level
* 7 2 5 2 4 7 4 5 5 8 *
2210/12
COMPUTER SCIENCE
Paper 1 Theory
October/November 2018
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
Answer all questions.
No marks will be awarded for using brand names of software packages or hardware.
Any businesses described in this paper are entirely fictitious.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The maximum number of marks is 75.
This document consists of 11 printed pages and 1 blank page.
DC (KS) 171196
© UCLES 2018
[Turn over
.
2
521
1
Computers use a character set to convert text into binary.
One character set that can be used is ASCII.
Each letter in ASCII can also be represented as a denary value.
(a) The word BUS has the denary values:
B
U
S
66
85
83
Convert the denary values into 8-bit binary.
66
85
83
[3]
(b) Each letter in ASCII can also be represented as a hexadecimal value.
The word KEY has the 8-bit binary values:
(i)
K
E
Y
01001011
01000101
01011001
Convert the three 8-bit binary values into hexadecimal.
01001011
...............................................
01000101
...............................................
01011001
...............................................
[3]
© UCLES 2018
2210/12/O/N/18
.
3
522
(ii)
Give three other uses of hexadecimal notation in computer science.
1 .........................................................................................................................................
2 .........................................................................................................................................
3 .........................................................................................................................................
[3]
(iii)
State two benefits of using hexadecimal notation to represent binary values.
Benefit 1 ............................................................................................................................
...........................................................................................................................................
Benefit 2 ............................................................................................................................
...........................................................................................................................................
[2]
2
A computer uses RAM and ROM to store data.
(a) The table contains three statements about RAM or ROM.
Tick (✓) to show whether each statement describes RAM or ROM.
Statement
RAM
(✓)
ROM
(✓)
Stores the programs and data that are currently in use
Used to boot up the computer when power is turned on
Contents are retained when power is turned off
[3]
(b) Circle the storage category that includes both RAM and ROM.
Primary
Secondary
Off-line
[1]
(c) Explain what is meant by off-line storage.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
© UCLES 2018
2210/12/O/N/18
[Turn over
.
4
523
3
A greenhouse uses a system to monitor the conditions that plants need to grow.
The inputs to the system are:
Binary
value
Input
W
T
H
Condition
1
Window is open
0
Window is closed
1
Temperature >=26 °C
0
Temperature <26 °C
1
Humidity >=50%
0
Humidity <50%
The system will sound an alarm when certain conditions are detected.
Alarm (X) will sound (=1) when:
window is closed and temperature >=26 °C
or
temperature <26 °C and humidity >=50%
Draw a logic circuit to represent the system.
W
T
X
H
[5]
© UCLES 2018
2210/12/O/N/18
.
5
524
4
(a) Identify three security issues that can put a computer system at risk.
Security issue 1 ........................................................................................................................
Security issue 2 ........................................................................................................................
Security issue 3 ........................................................................................................................
[3]
(b) Explain how a firewall can help to protect a computer system from security issues.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
5
(a) Karina is taking her Computer Science examination. She has three questions to answer
about output devices.
(i)
For the first question she writes the answer:
“It is a high powered laser that cuts materials such as thin metals or wood.”
Identify the output device that Karina is describing.
.......................................................................................................................................[1]
(ii)
For the second question she writes the answer:
“The screen is made up of blocks of red, green and blue pixels. The screen uses layers
of different types of liquid.”
Identify the output device that Karina is describing.
.......................................................................................................................................[1]
(iii)
For the third question she writes the answer:
“It is responsible for powering and moving a motor in machinery, such as a robot arm in
a factory.”
Identify the output device that Karina is describing.
.......................................................................................................................................[1]
© UCLES 2018
2210/12/O/N/18
[Turn over
.
6
525
(b) Karina correctly answers another examination question about some more output devices.
Five different terms have been removed from her answer.
Complete the sentences in Karina’s answer, using the list given. Not all terms in the list need
to be used.
•
•
•
•
•
•
•
•
•
•
3D
digital light projector
inkjet
interactive whiteboard
laser
rotating
scanning
sliding
speaker
thermal bubble
An ................................................................................................... allows a user to write on a
surface using a pen, the text and drawings can then be captured and stored for later use.
An ................................................................................................... printer produces a hard
copy of a document using ................................................................................................... and
piezoelectric technology. A ...................................................................................................
printer uses a .............................................................................................. drum, and positive
and negative charges, to produce a hard copy of a document.
[5]
© UCLES 2018
2210/12/O/N/18
.
7
526
6
(a) Many programmers write computer programs in high-level languages. The programs need to
be translated into machine code to be read by the computer.
State two types of translator that can be used.
Translator 1 ...............................................................................................................................
Translator 2 ...............................................................................................................................
[2]
(b) Explain two reasons why a computer programmer may choose to write a program in a highlevel language, rather than a low-level language.
Reason 1 ..................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Reason 2 ..................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
(c) Three examples of computer code are given in the table.
Tick (✓) to show whether each example of computer code is High-level language, Assembly
language or Machine code.
Computer code
High-level
language
(✓)
Assembly
language
(✓)
Machine
code
(✓)
10110111
11001100
01011100
FOR X = 1 TO 10
PRINT X
NEXT X
INP X
STA X
LDA Y
[3]
© UCLES 2018
2210/12/O/N/18
[Turn over
.
8
527
7
Six internet terms and six definitions are listed.
Draw a line to connect each term to a correct definition.
Internet term
Definition
Browser
A program that allows a user to view
webpages
Internet Service Provider
(ISP)
The main protocol that governs the
transmission of data using the Internet
Hyper Text Transfer Protocol
(HTTP)
The website address that is typed into the
address bar
Uniform Resource Locator
(URL)
An address given to each device on a network.
It is provided by the network
MAC address
A unique address given to a device on a
network. It is provided by the manufacturer
IP address
A company that provides a connection to
access the Internet
[5]
8
Describe the purpose of an interrupt in a computer system.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
© UCLES 2018
2210/12/O/N/18
.
9
528
9
(a) Computers can transmit data using different methods.
Describe the three data transmission methods given.
(i)
Serial data transmission
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(ii)
Parallel data transmission
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(iii)
Duplex data transmission
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
© UCLES 2018
2210/12/O/N/18
[Turn over
.
510
29
(b) Data can sometimes be corrupted when it is transmitted from one computer to another,
causing errors to be present in the data.
Identify and describe three methods of error detection that could be used to see if an error
has occurred.
Error detection method 1 ..........................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Error detection method 2 ..........................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Error detection method 3 ..........................................................................................................
Description .................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[9]
© UCLES 2018
2210/12/O/N/18
.
511
30
10 A system uses pH sensors and a microprocessor to help monitor pollution in a river.
The pH of the water should be between 6 and 8. The system outputs an alert if the pH of the water
is not in this range.
Explain how the system uses the pH sensors and the microprocessor to help monitor the pollution.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[5]
© UCLES 2018
2210/12/O/N/18
.
531
Cambridge Assessment International Education
Cambridge Ordinary Level
COMPUTER SCIENCE
2210/22
Paper 2
October/November 2018
MARK SCHEME
Maximum Mark: 50
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2018 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
This document consists of 11 printed pages.
© UCLES 2018
[Turn over
2210/22
.
Cambridge O Level – Mark Scheme
PUBLISHED
532
Generic Marking Principles
October/November 2018
These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.
GENERIC MARKING PRINCIPLE 1:
Marks must be awarded in line with:
•
•
•
the specific content of the mark scheme or the generic level descriptors for the question
the specific skills defined in the mark scheme or in the generic level descriptors for the question
the standard of response required by a candidate as exemplified by the standardisation scripts.
GENERIC MARKING PRINCIPLE 2:
Marks awarded are always whole marks (not half marks, or other fractions).
GENERIC MARKING PRINCIPLE 3:
Marks must be awarded positively:
•
•
•
•
•
marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
marks are awarded when candidates clearly demonstrate what they know and can do
marks are not deducted for errors
marks are not deducted for omissions
answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.
GENERIC MARKING PRINCIPLE 4:
Rules must be applied consistently e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.
© UCLES 2018
Page 2 of 11
2210/22
GENERIC MARKING PRINCIPLE 5:
.
Cambridge O Level – Mark Scheme
PUBLISHED
533
October/November 2018
Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).
GENERIC MARKING PRINCIPLE 6:
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.
© UCLES 2018
Page 3 of 11
.
2210/22
Cambridge O Level – Mark Scheme
PUBLISHED
534
Question
Answer
October/November 2018
Marks
Section A
1(a)(i)
Many correct answers, they must be meaningful. The name is an example only.
3
1 mark per bullet point
•
•
•
1(a)(ii)
Variable name
Data type
Use
Winner4to6
string
storing the unique id of the runner age 4 to 6 with the fastest time
Many correct answers, they must be meaningful. The names are examples only.
1 mark per bullet point
•
•
•
•
•
5 arrays seen
At least one suitable name e.g. IdNumber
At least one suitable datatype e.g. string
At least one suitable use e.g. to store the unique identification number
All 5 names, datatypes and uses correct
Array examples
Array name
IdNumber
Name
Age
NumRuns
PB
© UCLES 2018
datatype
integer
string
integer
integer
real
Use
unique identification number
name of child
age of child in years
number of 2 kilometre runs completed
fastest time run
Page 4 of 11
5
2210/22
Question
1(b)
.
Cambridge O Level – Mark Scheme
PUBLISHED
535
October/November 2018
Answer
Many correct answers. 1 mark for each correct point (max 4).
Marks
4
Ensuring uniqueness e.g.
• Search list of previously stored identification numbers (1)
• To check it has not already been used. (1)
Calculation and addition of check digit
• Attempt at calculation of check digit from the first three digits // calculation from all four digits to obtain zero remainder
(1)
• Adding the calculated check digit as a fourth digit // confirming the check digit is valid. (1)
1(c)
© UCLES 2018
Any four from:
1 Initialisation//Setting up array for race times for this race
2 Loop for all runners
3 Input ID
4 Check for valid ID number
5 Input start time and finish time
6 Calculate run time
7 Store run time in suitable array//Use ID index to store run time in appropriate position
8 Store ID in suitable array//Find index for runner
Page 5 of 11
4
2210/22
Question
1(c)
© UCLES 2018
.
Cambridge O Level – Mark Scheme
PUBLISHED
536
Answer
Sample answer:
Counter ← 1
Found ← FALSE
WHILE NOT Found = TRUE
OUTPUT "Please enter ID number use 9999 to finish "
INPUT ParkrunID
Search ← 1
REPEAT
IF ParkrunID = IdNumber[search] THEN Found TRUE
Search ← Search + 1
UNTIL Search = 21 OR Found = TRUE
ENDWHILE
RunnerID[Counter] ← ParkRunID
WHILE ParkRunID <> 9999
INPUT StartTime
INPUT FinishTime
RunnerTime[Counter] ← FinishTime – StartTime
Counter ← Counter + 1
Found ← FALSE
WHILE NOT Found = TRUE
OUTPUT "Please enter ID number (use 9999 to finish) "
INPUT ParkrunID
Search ← 1
REPEAT
IF ParkrunID = IdNumber[Search] THEN Found ← TRUE
Search ← Search + 1
UNTIL Search = 21 OR Found = TRUE
ENDWHILE
RunnerID[Counter] ← ParkRunID
ENDWHILE
Page 6 of 11
October/November 2018
Marks
.
2210/22
Cambridge O Level – Mark Scheme
PUBLISHED
537
Question
1(d)
Answer
1 mark for each correct point (max 4).
Marks
4
Explanation:
1 Search the results for this park run
2 Separate check for each age range
3 If time recorded is faster
4
store new fastest time
5
store the ID/Name for the runner
6 Use ID number/Index to look up name after all runners have been searched
7 Output name and fastest time
Programming statements may be used but must be fully explained.
© UCLES 2018
October/November 2018
Page 7 of 11
.
2210/22
Cambridge O Level – Mark Scheme
PUBLISHED
538
Question
Answer
October/November 2018
Marks
Section B
2(a)
Any five from:
1 Use of correct variables
2 Input 3 numbers
3 Check all 3 input numbers are different
4 Attempt to find the largest two numbers input
5 Correctly finding the largest two numbers
6 Multiply their two largest numbers together and assign to variable
7 Output the result of the multiplication
5
Sample answer:
REPEAT
OUTPUT "Enter three different numbers"
INPUT Number1, Number2, Number3
UNTIL Number1 <> Number2 AND Number2 <> Number3 AND Number3 <> Number1
IF Number3 < Number2 AND Number3 < Number1
THEN Answer ← Number1 * Number2
ENDIF
IF Number2 < Number3 AND Number2 < Number1
THEN Answer ← Number1 * Number3
ENDIF
IF Number1 < Number2 AND Number1 < Number3
THEN Answer ← Number2 * Number3
ENDIF
OUTPUT "Answer = ", Answer
2(b)
There are many correct answers. E.g.:
4
7, 7, 7
(1 mark)
should be rejected as numbers are equal (1 mark)
7, 8, 9
normal data answer should be 72
© UCLES 2018
(1 mark)
(1 mark)
Page 8 of 11
.
2210/22
Cambridge O Level – Mark Scheme
PUBLISHED
539
Question
3
Question
4
Answer
Marks
1 mark for each correct line (max 3)
Each box must have only one connection.
3
Answer
Marks
Answers must be given in context. There are many possible answers. E.g.:
Selection use of IF statement to check the values of the meter readings (1 mark)
IF Reading > 400 and Reading < 900 THEN …
(1 mark)
Repetition use of FOR loop to check all 2000 meter readings
FOR Meter = 1 TO 2000 … NEXT
© UCLES 2018
October/November 2018
Page 9 of 11
(1 mark)
(1 mark)
4
.
2210/22
Cambridge O Level – Mark Scheme
PUBLISHED
540
Question
5(a)
October/November 2018
Answer
Marks
Height
Depth
Chlorine
OK
OUTPUT
6
2.5
2
True
Pool OK to use
Height
Depth
Chlorine
OK
OUTPUT
4
3
1.5
True
Water too deep
6
False
Height
Depth
Chlorine
OK
OUTPUT
6
3.5
4
True
Water too deep
False
Too much chlorine add more water
1 mark for first 4 columns in each trace table (max 3)
1 mark for the output in each trace table (max 3)
5(b)
© UCLES 2018
Any one from:
Cannot add more water if the water is too deep
No validation e.g. allows a negative height/depth/amount of chlorine
Tells you to add chlorine when there is no water
Runs only once
Page 10 of 11
1
.
2210/22
Cambridge O Level – Mark Scheme
PUBLISHED
541
Question
6(a)
Answer
6(b)
4
Data type
Reference Number
Text
Size
Text
Type
Text/Boolean
Price in $
Number/Currency
1 mark per bullet:
•
•
•
© UCLES 2018
Marks
Many correct answers, an example is given. 1 mark for each correct row (max 4).
Field
October/November 2018
3
Incorrect field name for Reference Number
Incorrect criteria for Price in $ should be <
Type not checked
Page 11 of 11
.
542
Cambridge Assessment International Education
Cambridge Ordinary Level
COMPUTER SCIENCE
2210/12
Paper 1
October/November 2018
MARK SCHEME
Maximum Mark: 75
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2018 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
This document consists of 12 printed pages.
© UCLES 2018
[Turn over
2210/12
.
Cambridge O Level – Mark Scheme
PUBLISHED
543
Generic Marking Principles
October/November 2018
These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.
GENERIC MARKING PRINCIPLE 1:
Marks must be awarded in line with:
•
•
•
the specific content of the mark scheme or the generic level descriptors for the question
the specific skills defined in the mark scheme or in the generic level descriptors for the question
the standard of response required by a candidate as exemplified by the standardisation scripts.
GENERIC MARKING PRINCIPLE 2:
Marks awarded are always whole marks (not half marks, or other fractions).
GENERIC MARKING PRINCIPLE 3:
Marks must be awarded positively:
•
•
•
•
•
marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
marks are awarded when candidates clearly demonstrate what they know and can do
marks are not deducted for errors
marks are not deducted for omissions
answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.
GENERIC MARKING PRINCIPLE 4:
Rules must be applied consistently e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.
© UCLES 2018
Page 2 of 12
2210/12
GENERIC MARKING PRINCIPLE 5:
.
Cambridge O Level – Mark Scheme
PUBLISHED
544
October/November 2018
Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).
GENERIC MARKING PRINCIPLE 6:
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.
© UCLES 2018
Page 3 of 12
.
2210/12
Cambridge O Level – Mark Scheme
PUBLISHED
545
Question
1(a)
Answer
1 mark for each correct 8-bit binary number
October/November 2018
Marks
3
66
0
1
0
0
0
0
1
0
85
0
1
0
1
0
1
0
1
83
0
1
0
1
0
0
1
1
1(b)(i)
1 mark for each correct hexadecimal number
4B
45
59
3
1(b)(ii)
Three from:
• (HTML) colour codes
• Error messages
• MAC addresses
• IP addresses
• Assembly language
• Memory dump
• Locations in memory
3
1(b)(iii)
Two from:
• Easier to read/write/understand (for humans)
• Easier to remember (for humans)
• Short way to represent binary // Uses less screen/display space
• Fewer errors made (in data transcription)
• Easier to debug (for humans)
2
© UCLES 2018
Page 4 of 12
.
2210/12
Cambridge O Level – Mark Scheme
PUBLISHED
546
Question
2(a)
October/November 2018
Answer
Marks
1 mark for each correct tick (9)
3
Statement
Stores the programs and data that are currently in use
RAM
(9)
ROM
(9)
9
Used to boot up the computer when power is turned on
9
Contents are retained when power is turned off
9
2(b)
Primary
1
2(c)
Two from:
• Non-volatile storage
• Storage that can be disconnected/removed from the computer
• Any suitable example
• Must be (physically) connected to computer to obtain stored data
• Used to store files as a backup
2
© UCLES 2018
Page 5 of 12
2210/12
.
Cambridge O Level – Mark Scheme
PUBLISHED
547
Question
3
© UCLES 2018
Answer
1 mark for each correct logic gate, with correct inputs.
October/November 2018
Marks
5
Page 6 of 12
.
2210/12
Cambridge O Level – Mark Scheme
PUBLISHED
548
Question
Answer
October/November 2018
Marks
4(a)
Three from:
• Malware
• Virus // No antivirus
• Denial of service
• Spyware // No antispyware
• Phishing // opening unknown links/emails
• Pharming // opening unknown links/emails (only award once for this alternative)
• Hacking/cracking/unauthorised access // No/weak password // No/weak firewall
• Downloading/Using unknown software
• Not updating software
• Physical issue e.g. computer/door left unlocked
3
4(b)
Four from:
• It examines/monitors/filters traffic into and out of a computer
• It allows a user to set criteria/rules for the traffic
• It checks whether the traffic meets the criteria/rules
• It blocks any traffic that does not meet the criteria/rules // Blocks unauthorised access
• It warns a user of any unauthorised software/access/unauthorised outgoing traffic
• It keeps a log of all traffic (that can be examined)
4
Question
Answer
Marks
5(a)(i)
2D/3D cutter
1
5(a)(ii)
Liquid crystal display // LCD
1
5(a)(iii)
Actuator
1
1 mark for each correct missing word, in the given order:
• interactive whiteboard
• inkjet
• thermal bubble
• laser
• rotating
5
5(b)
© UCLES 2018
Page 7 of 12
.
2210/12
Cambridge O Level – Mark Scheme
PUBLISHED
549
Question
6(a)
6(b)
© UCLES 2018
Answer
•
•
October/November 2018
Marks
2
Compiler
Interpreter
Four from:
• Closer to human language/English «
• « so it is easier/quicker to read/write/understand
• « so it is easier/quicker to debug the program
• « therefore, less likely to make errors
•
•
•
The program can be used on many different platforms «
« because it is written in source code
« because it is compiled into object code
•
•
They have built-in functions/libraries «
« this saves time when writing the program
•
•
Do not need to manipulate memory addresses directly «
« therefore, specialist knowledge of this is not required
•
•
Only need to learn a single language «
« as this can be used on many different computers
Page 8 of 12
4
.
2210/12
Cambridge O Level – Mark Scheme
PUBLISHED
550
Question
6(c)
October/November 2018
Answer
Marks
1 mark for each correct tick (9)
Computer code
3
High-level
language
(9)
Assembly
language
(9)
10110111
11001100
01011100
FOR X = 1 TO 10
PRINT X
NEXT X
9
9
INP X
STA X
LDA Y
© UCLES 2018
Machine
code
(9)
9
Page 9 of 12
.
2210/12
Cambridge O Level – Mark Scheme
PUBLISHED
551
Question
7
Answer
1 mark for each correct line (to a maximum of 5)
Browser
© UCLES 2018
October/November 2018
Marks
5
A program that allows a user to view
webpages
Internet Service Provider
(ISP)
The main protocol that governs the
transmission of data using the Internet
Hypertext Transfer Protocol
(HTTP)
The website address that is typed into
the address bar
Uniform Resource Locator
(URL)
An address given to each device on a
network. It is provided by the network
MAC address
A unique address given to a device on
a network. It is provided by the
manufacturer
IP address
A company that provides a connection
to access the Internet
Page 10 of 12
2210/12
.
Cambridge O Level – Mark Scheme
PUBLISHED
552
Question
8
Answer
Four from:
• Used to attend to certain tasks/issues
• Used to make sure that vital tasks are dealt with immediately
• The interrupt/signal tells the CPU/processor (that its attention is required)
• A signal that can be sent from a device (attached to the computer)
• A signal that can be sent from software (installed on the computer)
• The interrupt will cause the OS/current process to pause
• The OS/CPU/ISR will service/handle the interrupt
• They have different levels of priority
• After the interrupt is serviced, the (previous) process is continued
• It enables multi-tasking to be carried out on a computer
• A valid example of an interrupt e.g. ‘out of paper’ message for a printer
Question
Answer
October/November 2018
Marks
4
Marks
9(a)(i)
Two from:
• Data is transmitted one bit at a time
• Data is transmitted using a single wire
• Bits arrive in order/sequence
2
9(a)(ii)
Two from:
• Data is transmitted multiple bits at a time/simultaneously
• Data is transmitted using multiple wires
• Bits may arrive out of sequence/skewed (and are reordered)
2
9(a)(iii)
1 mark for each:
• Data is transmitted in both directions
• « at the same time/simultaneously
2
© UCLES 2018
Page 11 of 12
2210/12
.
Cambridge O Level – Mark Scheme
PUBLISHED
553
Question
9(b)
October/November 2018
Answer
Maximum of three marks per error detection method.
1 mark for naming the method, 2 marks for describing it.
Parity (check)
• Odd or even parity can be used
• Bits are added together // 1 bits are counted
• Parity bit added (depending on parity set)
• Parity checked on receipt
• If parity bit is incorrect an error is detected
Marks
9
Checksum
• Calculation performed on data (to get the checksum)
• Checksum sent with data
• Checksum recalculated after transmission
• Comparison made between checksum before and checksum after transmission
• Error detected if checksums are different
Automatic repeat request (ARQ)
• Uses acknowledgement and timeout
• Request is sent (with data) requiring acknowledgement
• If no response/acknowledgment within certain time frame data package is resent
• When data received contains an error a request is sent (automatically) to resend the data
• The resend request is repeatedly sent until packet is received error free/limit is reached/acknowledgement received
Question
10
© UCLES 2018
Answer
Five from:
• The sensor sends data to the microprocessor
• The analogue data is converted to digital (using ADC)
• The microprocessor compares the reading to the set range/stored values/stored data (6 to 8) «
– « If the reading is >8 or <6 / outside range «
o « the microprocessor sends a signal to output the alert
• The process is continuous/repeated
Page 12 of 12
Marks
5
Download