SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS
GCE Advanced Subsidiary Level and GCE Advanced Level




MARK SCHEME for the October/November 2006 question paper




                                9691 COMPUTING
           9691/03          Paper 3, maximum raw mark 90



This mark scheme is published as an aid to teachers and students, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began.

All Examiners are instructed that alternative correct answers and unexpected approaches in
candidates’ scripts must be given marks that fairly reflect the relevant knowledge and skills
demonstrated.

Mark schemes must be read in conjunction with the question papers and the report on the
examination.

The grade thresholds for various grades are published in the report on the examination for most
IGCSE, GCE Advanced Level and Advanced Subsidiary Level syllabuses.



•   CIE will not enter into discussions or correspondence in connection with these mark schemes.



CIE is publishing the mark schemes for the October/November 2006 question papers for most IGCSE,
GCE Advanced Level and Advanced Subsidiary Level syllabuses and some Ordinary Level
syllabuses.




                            www.xtremepapers.net
Page 2                            Mark Scheme                                  Syllabus          Paper
                              GCE A/AS LEVEL - OCT/NOV 2006                         9691              03

1 (a)   (i)     -stores the instruction that
                -is currently being processed
                -splits the binary code into operation code and address
                (1 per -, max 2)                                                                             (2)

        (ii)    -stores the address (in memory)
                -of data to be accessed (from memory)
                -instruction/raw data
                (1 per -, max 2)                                                                             (2)

        (iii)   -stores the address of the next instruction to be accessed
                -is incremented (after contents are copied to MAR)
                -is altered to allow for jump instructions
                (1 per -, max 2)                                                                             (2)

        (iv)    -contains a value which is added to the address (in the CIR)
                -in order to make the address of the data
                -incremented after use so that a set of data can be read one after the other without
                altering the raw address
                (1 per -, max 2)                                                                             (2)

  (b)   (i)     -a number of processors
                -operate together
                -so that a set of operations can be carried out simultaneously
                (1 per -, max 2)                                                                             (2)

        (ii)    -any example that requires large amounts of processing e.g. weather forecasting
                -because large quantities of processing are required in a set time period                    (2)

2 (a)   (i)     unique value in the table used to identify the record

        (ii)    key used to access the records in a different order

        (iii)   an attribute in one table that is a primary key in another table/to provide a link between
                tables                                                                                       (3)

  (b)   -reduces duplication of data/no duplication of data
        -(improved) data integrity
        -allows for different views of the data
        -more simple to control access to data
        -simpler/faster/easier to access specific data through searches/queries
        (1 per -, max 3)                                                                                     (3)




                                                 © UCLES 2006


                                   www.xtremepapers.net
Page 3                           Mark Scheme                                   Syllabus          Paper
                                 GCE A/AS LEVEL - OCT/NOV 2006                          9691              03

3 (i)      -the old system and the new system are run together (until the new system is proven)
           -very important application so the costs are worth paying
           -time is important in producing results so cannot afford to wait while bugs are corrected
           -allows workers to become familiar with new system before changeover
           -reduces risk to end product

  (ii)     -one area of the organization is converted to the new system while the remainder uses the
           old
           -could be one subject/one area of the world
           -would mean that effect of any problems would be minimized (and so small that remedial
           action could be taken)
           -allows workers to familiarize themselves with the new system on a rota basis

  (iii)    -the old system is switched off/the new one takes over immediately
           -very risky because the results are so important and
           -time dependent
           -allows no time for training/finding errors in software solution.
           (1 per -, max 3 per section, max 9)                                                                   (9)

4 (a)      -the production of a machine code program/intermediate code which…
           -will produce the results intended by the source code
           -optimisation reduces the size of the object code by…
           -removing any duplicate or redundant instructions…
           -which improves speed of execution
           (1 per -, max 3)                                                                                      (3)

  (b)      (i)     -linkers join together (compiled) modules of code
                   -to produce an executable file
                   -needs to match up address references between modules

           (ii)    -takes a set of code from storage and copies it into memory
                   -needs to resolve problems with addresses
                   -mention of linking loader
                   (1 per -, max 2 per section, max 4)                                                           (4)

5 (a)      (i)     01101101                               (1 per nibble)                                         (2)

           (ii)    0001 0000 1001                         (1 for use of 12 bits, 1 for correct answer)           (2)

           (iii)   6D                                     (1 per digit)                                          (2)

  (b)      (i)     -46                                    (1 for negative, 1 for 46)                             (2)

           (ii)    -(1)00101111/result = +47
                   -a positive and negative have been added together and the result is positive
                   -because the larger value was positive.
                   -there was carry in and out of MSB therefore ignore carry out, (result is correct).
                   (1 per -, max 1 for either answer, max 2 for discussion, max 3)                               (3)




                                                    © UCLES 2006


                                      www.xtremepapers.net
Page 4                         Mark Scheme                                Syllabus         Paper
                            GCE A/AS LEVEL - OCT/NOV 2006                       9691             03

6 -workers supervised more closely because of electronic ‘spying’
  -can be disciplined for lack of work
  -can be rewarded for ‘hidden’ work
  -less trade union power
  -because workers do not work as a unit
  -less pressure on workers in disputes
  -call centre type jobs
  -clean, well paid
  -soul destroying
  -need to train to keep abreast of use of technology
  -more qualified worker can demand higher rewards
  -meetings and video conferencing
  -use of emails and other communication
  -dangerous tasks made safer
  -new job types created
  -allows more work to be done in the same amount of time
  -use of technology to carry out old tasks in a new way/new data storage and retrieval techniques
  (1 per -, max 8)                                                                                      (8)
7 (a)   -a computer language used to create multimedia pages
        -each page consists of the text to be displayed
        -tags providing special instructions about the display
        -provides links to files/pages (picture/sound/video/…)
        (1 per -, max 2)                                                                                (2)
  (b)   -Tags may be used to indicate where
              -illustrations are to be inserted into the text
        -Tags can be used to change text style
              -sizes/fonts
        -Tags may be used to change colours of
              -backgrounds/text
        -Tags may be used to define some text as a link
              -or as a hot button/spot
        -Links
              -provide a fast way of navigating between pages
        -Use of different page areas which
              -allow different rules in each area/heading and body/makes searching easy
        (1 per pair, max 3 pairs, max 6)                                                                (6)
8 (a)   Input: Any two from touch/radar/proximity/infra red sensors
        Output: Any two from alarm/speakers/lights/motors to activate wheels/steering/actuators         (4)
  (b)   (i)    -optical sensors
               -radar
               -used to detect obstacles
               Positions determined by
               -angular bearing from reference point
               -distance from radar
               (1 per -, max 2)                                                                         (2)
        (ii)   -design must be created using simulation because of large cost of real thing
               -testing also simulated because not possible to test in real environment.
               (1 per -, max 2)                                                                         (2)
  (c)   -factory robot is physically available to people to control it/commands acted upon
        immediately/need to have immediate action because of proximity to humans
        -Mars robot cannot be controlled in real-time because of the time taken for instructions to
        reach it/instructions need to be sent as a batch and then acted upon and results sent back to
        operator on earth.                                                                              (2)
                                               © UCLES 2006


                                 www.xtremepapers.net
Page 5                           Mark Scheme                                 Syllabus          Paper
                              GCE A/AS LEVEL - OCT/NOV 2006                        9691              03

9 (a)    -a number of jobs will want to be run at the same time
         -processor can only run one job at a time
         -in order that the jobs are treated ‘fairly’
         -the operating system has to have rules to determine the order of execution/make maximum
         use of resources
         (1 per –, max 2)                                                                                    (2)

   (b)   -order of jobs according to list of priorities
         -each job allocated priority according to…
         -importance/time already spent on job/need for peripheral devices
         -jobs can be in any of three states: ready, running or blocked
         -Ready Q contains list of jobs waiting for processing in the order in which they should be
         processed
         -HLS handles ready Q and loads jobs
         -MLS handles the swapping of data between memory and storage
         -LLS moves jobs in and out of running state
         -preemptive scheduler has control over what is in running state, non-preemptive simply
         follows the Q
         (1 per -, max 5)                                                                                    (5)

10 (a)   -a number of programmers can all work on the same piece of software
         -individual expertise can be utilized
         -errors are far more easily spotted because…
         -each procedure/function is much simpler to solve than the original problem
         -individual procedures are far easier to test than a whole project
         -library routines can be utilized
         -procedure can be used multiple times
         -functions are mathematically provable to be correct/faulty
         (1 per -, max 4)                                                                                    (4)

   (b)   (i)     a variable whose value only applies in a particular procedure

         (ii)    a variable whose value applies throughout a program

         (iii)   a value which is applied to a variable within a procedure, and only within that procedure

         (iv)    the value to be applied is stored in a memory location which is passed to the
                 procedure. Any change will be carried out of the procedure.                                 (4)

   (c)   -return address placed on stack
         -along with values of parameters
         -parameters read off stack by procedure
         -any returning values placed on stack by procedure
         -return to address at top of stack at end of procedure.
         (1 per -, max 4)                                                                                    (4)




                                                 © UCLES 2006


                                   www.xtremepapers.net

Contenu connexe

Tendances

June 08 P3
June 08 P3June 08 P3
June 08 P3Samimvez
 
June 10 MS11
June 10 MS11June 10 MS11
June 10 MS11Samimvez
 
June 10 P31
June 10 P31June 10 P31
June 10 P31Samimvez
 
Nov 09 P11
Nov 09 P11Nov 09 P11
Nov 09 P11Samimvez
 
June 10 P32
June 10 P32June 10 P32
June 10 P32Samimvez
 
Nov 09 P32
Nov 09 P32Nov 09 P32
Nov 09 P32Samimvez
 
June 05 MS1
June 05 MS1June 05 MS1
June 05 MS1Samimvez
 
Autonomous control in Big Data platforms: and experience with Cassandra
Autonomous control in Big Data platforms: and experience with CassandraAutonomous control in Big Data platforms: and experience with Cassandra
Autonomous control in Big Data platforms: and experience with CassandraEmiliano
 
Reliability Modeling and Analysis of Energy-Efficient Storage Systems
Reliability Modeling and Analysis of Energy-Efficient Storage SystemsReliability Modeling and Analysis of Energy-Efficient Storage Systems
Reliability Modeling and Analysis of Energy-Efficient Storage SystemsXiao Qin
 
June 03 MS1
June 03 MS1June 03 MS1
June 03 MS1Samimvez
 
March 2013 (BMC: Marimba Roadmap)
March 2013 (BMC: Marimba Roadmap)March 2013 (BMC: Marimba Roadmap)
March 2013 (BMC: Marimba Roadmap)CM-UG.com
 
HA Hadoop -ApacheCon talk
HA Hadoop -ApacheCon talkHA Hadoop -ApacheCon talk
HA Hadoop -ApacheCon talkSteve Loughran
 
MapReduce: A useful parallel tool that still has room for improvement
MapReduce: A useful parallel tool that still has room for improvementMapReduce: A useful parallel tool that still has room for improvement
MapReduce: A useful parallel tool that still has room for improvementKyong-Ha Lee
 

Tendances (16)

June 08 P3
June 08 P3June 08 P3
June 08 P3
 
June 10 MS11
June 10 MS11June 10 MS11
June 10 MS11
 
Nov 06 P1
Nov 06 P1Nov 06 P1
Nov 06 P1
 
June 10 P31
June 10 P31June 10 P31
June 10 P31
 
Nov 09 P11
Nov 09 P11Nov 09 P11
Nov 09 P11
 
June 10 P32
June 10 P32June 10 P32
June 10 P32
 
Nov 09 P32
Nov 09 P32Nov 09 P32
Nov 09 P32
 
June 05 MS1
June 05 MS1June 05 MS1
June 05 MS1
 
Autonomous control in Big Data platforms: and experience with Cassandra
Autonomous control in Big Data platforms: and experience with CassandraAutonomous control in Big Data platforms: and experience with Cassandra
Autonomous control in Big Data platforms: and experience with Cassandra
 
Nov 05 P3
Nov 05 P3Nov 05 P3
Nov 05 P3
 
Hardware
HardwareHardware
Hardware
 
Reliability Modeling and Analysis of Energy-Efficient Storage Systems
Reliability Modeling and Analysis of Energy-Efficient Storage SystemsReliability Modeling and Analysis of Energy-Efficient Storage Systems
Reliability Modeling and Analysis of Energy-Efficient Storage Systems
 
June 03 MS1
June 03 MS1June 03 MS1
June 03 MS1
 
March 2013 (BMC: Marimba Roadmap)
March 2013 (BMC: Marimba Roadmap)March 2013 (BMC: Marimba Roadmap)
March 2013 (BMC: Marimba Roadmap)
 
HA Hadoop -ApacheCon talk
HA Hadoop -ApacheCon talkHA Hadoop -ApacheCon talk
HA Hadoop -ApacheCon talk
 
MapReduce: A useful parallel tool that still has room for improvement
MapReduce: A useful parallel tool that still has room for improvementMapReduce: A useful parallel tool that still has room for improvement
MapReduce: A useful parallel tool that still has room for improvement
 

En vedette

0497. kandža crnog sokola
0497. kandža crnog sokola0497. kandža crnog sokola
0497. kandža crnog sokolaTompa *
 
Mrs. Dunham's January Calendar 2013
Mrs. Dunham's January Calendar 2013Mrs. Dunham's January Calendar 2013
Mrs. Dunham's January Calendar 2013suejdunham
 
Powerpoint 365Vision Dotnet
Powerpoint 365Vision DotnetPowerpoint 365Vision Dotnet
Powerpoint 365Vision Dotnetppkc
 
Zs 0018 Kazna Za Oholog Pukovnika
Zs 0018  Kazna Za Oholog PukovnikaZs 0018  Kazna Za Oholog Pukovnika
Zs 0018 Kazna Za Oholog PukovnikaTompa *
 
082. PUTOVANJE RAKETOM
082. PUTOVANJE RAKETOM082. PUTOVANJE RAKETOM
082. PUTOVANJE RAKETOMTompa *
 
Zagor - 004 - tajanstveni samostan part 2
Zagor - 004 - tajanstveni samostan part 2Zagor - 004 - tajanstveni samostan part 2
Zagor - 004 - tajanstveni samostan part 2Blagojce Treneski
 
0558. Zlokobna MočVara
0558. Zlokobna MočVara0558. Zlokobna MočVara
0558. Zlokobna MočVaraTompa *
 
Tablas de multiplicar
Tablas de multiplicar Tablas de multiplicar
Tablas de multiplicar luisavidal04
 
0554. STAZA SMRTI
0554. STAZA SMRTI0554. STAZA SMRTI
0554. STAZA SMRTITompa *
 

En vedette (20)

0497. kandža crnog sokola
0497. kandža crnog sokola0497. kandža crnog sokola
0497. kandža crnog sokola
 
Feb 25 Notes
Feb  25 NotesFeb  25 Notes
Feb 25 Notes
 
Veggies in nets
Veggies in netsVeggies in nets
Veggies in nets
 
May 28
May 28May 28
May 28
 
Jan 29 Notes
Jan  29 NotesJan  29 Notes
Jan 29 Notes
 
Mrs. Dunham's January Calendar 2013
Mrs. Dunham's January Calendar 2013Mrs. Dunham's January Calendar 2013
Mrs. Dunham's January Calendar 2013
 
Powerpoint 365Vision Dotnet
Powerpoint 365Vision DotnetPowerpoint 365Vision Dotnet
Powerpoint 365Vision Dotnet
 
Test
TestTest
Test
 
Zs 0018 Kazna Za Oholog Pukovnika
Zs 0018  Kazna Za Oholog PukovnikaZs 0018  Kazna Za Oholog Pukovnika
Zs 0018 Kazna Za Oholog Pukovnika
 
7 r angi negj-1
7 r angi negj-17 r angi negj-1
7 r angi negj-1
 
082. PUTOVANJE RAKETOM
082. PUTOVANJE RAKETOM082. PUTOVANJE RAKETOM
082. PUTOVANJE RAKETOM
 
G G - VB - LMS 467
G G - VB - LMS 467G G - VB - LMS 467
G G - VB - LMS 467
 
Zagor - 004 - tajanstveni samostan part 2
Zagor - 004 - tajanstveni samostan part 2Zagor - 004 - tajanstveni samostan part 2
Zagor - 004 - tajanstveni samostan part 2
 
Ok Bl - VB - Kol
Ok Bl - VB - KolOk Bl - VB - Kol
Ok Bl - VB - Kol
 
0558. Zlokobna MočVara
0558. Zlokobna MočVara0558. Zlokobna MočVara
0558. Zlokobna MočVara
 
P H - VB - LMS 332
P H - VB - LMS 332P H - VB - LMS 332
P H - VB - LMS 332
 
Tablas de multiplicar
Tablas de multiplicar Tablas de multiplicar
Tablas de multiplicar
 
G D - VB - LMS 462
G D - VB - LMS 462G D - VB - LMS 462
G D - VB - LMS 462
 
0554. STAZA SMRTI
0554. STAZA SMRTI0554. STAZA SMRTI
0554. STAZA SMRTI
 
Fr va - KT - LMS 69
Fr va - KT - LMS 69Fr va - KT - LMS 69
Fr va - KT - LMS 69
 

Similaire à GCE Advanced Level Computing Mark Scheme

Nov 09 MS11
Nov 09 MS11Nov 09 MS11
Nov 09 MS11Samimvez
 
Nov 06 MS1
Nov 06 MS1Nov 06 MS1
Nov 06 MS1Samimvez
 
Nov 05 MS1
Nov 05 MS1Nov 05 MS1
Nov 05 MS1Samimvez
 
June 07 MS1
June 07 MS1June 07 MS1
June 07 MS1Samimvez
 
Nov 09 MS12
Nov 09 MS12Nov 09 MS12
Nov 09 MS12Samimvez
 
June 07 MS3
June 07 MS3June 07 MS3
June 07 MS3Samimvez
 
Nov 08 MS1
Nov 08 MS1Nov 08 MS1
Nov 08 MS1Samimvez
 
June 06 MS3
June 06 MS3June 06 MS3
June 06 MS3Samimvez
 
Nov 08 MS3
Nov 08 MS3Nov 08 MS3
Nov 08 MS3Samimvez
 
Nov 09 MS31
Nov 09 MS31Nov 09 MS31
Nov 09 MS31Samimvez
 
Nov 07 MS3
Nov 07 MS3Nov 07 MS3
Nov 07 MS3Samimvez
 
June 05 MS3
June 05 MS3June 05 MS3
June 05 MS3Samimvez
 
June 10 MS33
June 10 MS33June 10 MS33
June 10 MS33Samimvez
 
June 04 MS
June 04 MSJune 04 MS
June 04 MSSamimvez
 
June 09 MS1
June 09 MS1June 09 MS1
June 09 MS1Samimvez
 
Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 3
Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 3Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 3
Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 3Alpro
 
June 10 MS12
June 10 MS12June 10 MS12
June 10 MS12Samimvez
 
Nov 07 MS1
Nov 07 MS1Nov 07 MS1
Nov 07 MS1Samimvez
 
Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 1
Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 1Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 1
Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 1Alpro
 
Computing 9691 Mark Scheme for May / June 2007 Cambridge
Computing 9691 Mark Scheme for May / June 2007 CambridgeComputing 9691 Mark Scheme for May / June 2007 Cambridge
Computing 9691 Mark Scheme for May / June 2007 CambridgeAlpro
 

Similaire à GCE Advanced Level Computing Mark Scheme (20)

Nov 09 MS11
Nov 09 MS11Nov 09 MS11
Nov 09 MS11
 
Nov 06 MS1
Nov 06 MS1Nov 06 MS1
Nov 06 MS1
 
Nov 05 MS1
Nov 05 MS1Nov 05 MS1
Nov 05 MS1
 
June 07 MS1
June 07 MS1June 07 MS1
June 07 MS1
 
Nov 09 MS12
Nov 09 MS12Nov 09 MS12
Nov 09 MS12
 
June 07 MS3
June 07 MS3June 07 MS3
June 07 MS3
 
Nov 08 MS1
Nov 08 MS1Nov 08 MS1
Nov 08 MS1
 
June 06 MS3
June 06 MS3June 06 MS3
June 06 MS3
 
Nov 08 MS3
Nov 08 MS3Nov 08 MS3
Nov 08 MS3
 
Nov 09 MS31
Nov 09 MS31Nov 09 MS31
Nov 09 MS31
 
Nov 07 MS3
Nov 07 MS3Nov 07 MS3
Nov 07 MS3
 
June 05 MS3
June 05 MS3June 05 MS3
June 05 MS3
 
June 10 MS33
June 10 MS33June 10 MS33
June 10 MS33
 
June 04 MS
June 04 MSJune 04 MS
June 04 MS
 
June 09 MS1
June 09 MS1June 09 MS1
June 09 MS1
 
Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 3
Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 3Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 3
Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 3
 
June 10 MS12
June 10 MS12June 10 MS12
June 10 MS12
 
Nov 07 MS1
Nov 07 MS1Nov 07 MS1
Nov 07 MS1
 
Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 1
Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 1Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 1
Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 1
 
Computing 9691 Mark Scheme for May / June 2007 Cambridge
Computing 9691 Mark Scheme for May / June 2007 CambridgeComputing 9691 Mark Scheme for May / June 2007 Cambridge
Computing 9691 Mark Scheme for May / June 2007 Cambridge
 

Plus de Samimvez

Plus de Samimvez (20)

Sql installation tutorial
Sql installation tutorialSql installation tutorial
Sql installation tutorial
 
Example3
Example3Example3
Example3
 
Coms1010 exam paper - nov10
Coms1010   exam paper - nov10Coms1010   exam paper - nov10
Coms1010 exam paper - nov10
 
Coms1010 exam paper - may 08
Coms1010   exam paper - may 08Coms1010   exam paper - may 08
Coms1010 exam paper - may 08
 
Example2
Example2Example2
Example2
 
Labsheet 3
Labsheet 3Labsheet 3
Labsheet 3
 
Labsheet 3,5
Labsheet 3,5Labsheet 3,5
Labsheet 3,5
 
EQ V3x
EQ V3xEQ V3x
EQ V3x
 
Eq v2
Eq v2Eq v2
Eq v2
 
3.6
3.63.6
3.6
 
3.2
3.23.2
3.2
 
3.10
3.103.10
3.10
 
3.1
3.13.1
3.1
 
3.3
3.33.3
3.3
 
3.8
3.83.8
3.8
 
3.4
3.43.4
3.4
 
3.7
3.73.7
3.7
 
3.5
3.53.5
3.5
 
3.9
3.93.9
3.9
 
June 02 MS2
June 02 MS2June 02 MS2
June 02 MS2
 

Dernier

Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Dernier (20)

Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

GCE Advanced Level Computing Mark Scheme

  • 1. UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS GCE Advanced Subsidiary Level and GCE Advanced Level MARK SCHEME for the October/November 2006 question paper 9691 COMPUTING 9691/03 Paper 3, maximum raw mark 90 This mark scheme is published as an aid to teachers and students, to indicate the requirements of the examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the details of the discussions that took place at an Examiners’ meeting before marking began. All Examiners are instructed that alternative correct answers and unexpected approaches in candidates’ scripts must be given marks that fairly reflect the relevant knowledge and skills demonstrated. Mark schemes must be read in conjunction with the question papers and the report on the examination. The grade thresholds for various grades are published in the report on the examination for most IGCSE, GCE Advanced Level and Advanced Subsidiary Level syllabuses. • CIE will not enter into discussions or correspondence in connection with these mark schemes. CIE is publishing the mark schemes for the October/November 2006 question papers for most IGCSE, GCE Advanced Level and Advanced Subsidiary Level syllabuses and some Ordinary Level syllabuses. www.xtremepapers.net
  • 2. Page 2 Mark Scheme Syllabus Paper GCE A/AS LEVEL - OCT/NOV 2006 9691 03 1 (a) (i) -stores the instruction that -is currently being processed -splits the binary code into operation code and address (1 per -, max 2) (2) (ii) -stores the address (in memory) -of data to be accessed (from memory) -instruction/raw data (1 per -, max 2) (2) (iii) -stores the address of the next instruction to be accessed -is incremented (after contents are copied to MAR) -is altered to allow for jump instructions (1 per -, max 2) (2) (iv) -contains a value which is added to the address (in the CIR) -in order to make the address of the data -incremented after use so that a set of data can be read one after the other without altering the raw address (1 per -, max 2) (2) (b) (i) -a number of processors -operate together -so that a set of operations can be carried out simultaneously (1 per -, max 2) (2) (ii) -any example that requires large amounts of processing e.g. weather forecasting -because large quantities of processing are required in a set time period (2) 2 (a) (i) unique value in the table used to identify the record (ii) key used to access the records in a different order (iii) an attribute in one table that is a primary key in another table/to provide a link between tables (3) (b) -reduces duplication of data/no duplication of data -(improved) data integrity -allows for different views of the data -more simple to control access to data -simpler/faster/easier to access specific data through searches/queries (1 per -, max 3) (3) © UCLES 2006 www.xtremepapers.net
  • 3. Page 3 Mark Scheme Syllabus Paper GCE A/AS LEVEL - OCT/NOV 2006 9691 03 3 (i) -the old system and the new system are run together (until the new system is proven) -very important application so the costs are worth paying -time is important in producing results so cannot afford to wait while bugs are corrected -allows workers to become familiar with new system before changeover -reduces risk to end product (ii) -one area of the organization is converted to the new system while the remainder uses the old -could be one subject/one area of the world -would mean that effect of any problems would be minimized (and so small that remedial action could be taken) -allows workers to familiarize themselves with the new system on a rota basis (iii) -the old system is switched off/the new one takes over immediately -very risky because the results are so important and -time dependent -allows no time for training/finding errors in software solution. (1 per -, max 3 per section, max 9) (9) 4 (a) -the production of a machine code program/intermediate code which… -will produce the results intended by the source code -optimisation reduces the size of the object code by… -removing any duplicate or redundant instructions… -which improves speed of execution (1 per -, max 3) (3) (b) (i) -linkers join together (compiled) modules of code -to produce an executable file -needs to match up address references between modules (ii) -takes a set of code from storage and copies it into memory -needs to resolve problems with addresses -mention of linking loader (1 per -, max 2 per section, max 4) (4) 5 (a) (i) 01101101 (1 per nibble) (2) (ii) 0001 0000 1001 (1 for use of 12 bits, 1 for correct answer) (2) (iii) 6D (1 per digit) (2) (b) (i) -46 (1 for negative, 1 for 46) (2) (ii) -(1)00101111/result = +47 -a positive and negative have been added together and the result is positive -because the larger value was positive. -there was carry in and out of MSB therefore ignore carry out, (result is correct). (1 per -, max 1 for either answer, max 2 for discussion, max 3) (3) © UCLES 2006 www.xtremepapers.net
  • 4. Page 4 Mark Scheme Syllabus Paper GCE A/AS LEVEL - OCT/NOV 2006 9691 03 6 -workers supervised more closely because of electronic ‘spying’ -can be disciplined for lack of work -can be rewarded for ‘hidden’ work -less trade union power -because workers do not work as a unit -less pressure on workers in disputes -call centre type jobs -clean, well paid -soul destroying -need to train to keep abreast of use of technology -more qualified worker can demand higher rewards -meetings and video conferencing -use of emails and other communication -dangerous tasks made safer -new job types created -allows more work to be done in the same amount of time -use of technology to carry out old tasks in a new way/new data storage and retrieval techniques (1 per -, max 8) (8) 7 (a) -a computer language used to create multimedia pages -each page consists of the text to be displayed -tags providing special instructions about the display -provides links to files/pages (picture/sound/video/…) (1 per -, max 2) (2) (b) -Tags may be used to indicate where -illustrations are to be inserted into the text -Tags can be used to change text style -sizes/fonts -Tags may be used to change colours of -backgrounds/text -Tags may be used to define some text as a link -or as a hot button/spot -Links -provide a fast way of navigating between pages -Use of different page areas which -allow different rules in each area/heading and body/makes searching easy (1 per pair, max 3 pairs, max 6) (6) 8 (a) Input: Any two from touch/radar/proximity/infra red sensors Output: Any two from alarm/speakers/lights/motors to activate wheels/steering/actuators (4) (b) (i) -optical sensors -radar -used to detect obstacles Positions determined by -angular bearing from reference point -distance from radar (1 per -, max 2) (2) (ii) -design must be created using simulation because of large cost of real thing -testing also simulated because not possible to test in real environment. (1 per -, max 2) (2) (c) -factory robot is physically available to people to control it/commands acted upon immediately/need to have immediate action because of proximity to humans -Mars robot cannot be controlled in real-time because of the time taken for instructions to reach it/instructions need to be sent as a batch and then acted upon and results sent back to operator on earth. (2) © UCLES 2006 www.xtremepapers.net
  • 5. Page 5 Mark Scheme Syllabus Paper GCE A/AS LEVEL - OCT/NOV 2006 9691 03 9 (a) -a number of jobs will want to be run at the same time -processor can only run one job at a time -in order that the jobs are treated ‘fairly’ -the operating system has to have rules to determine the order of execution/make maximum use of resources (1 per –, max 2) (2) (b) -order of jobs according to list of priorities -each job allocated priority according to… -importance/time already spent on job/need for peripheral devices -jobs can be in any of three states: ready, running or blocked -Ready Q contains list of jobs waiting for processing in the order in which they should be processed -HLS handles ready Q and loads jobs -MLS handles the swapping of data between memory and storage -LLS moves jobs in and out of running state -preemptive scheduler has control over what is in running state, non-preemptive simply follows the Q (1 per -, max 5) (5) 10 (a) -a number of programmers can all work on the same piece of software -individual expertise can be utilized -errors are far more easily spotted because… -each procedure/function is much simpler to solve than the original problem -individual procedures are far easier to test than a whole project -library routines can be utilized -procedure can be used multiple times -functions are mathematically provable to be correct/faulty (1 per -, max 4) (4) (b) (i) a variable whose value only applies in a particular procedure (ii) a variable whose value applies throughout a program (iii) a value which is applied to a variable within a procedure, and only within that procedure (iv) the value to be applied is stored in a memory location which is passed to the procedure. Any change will be carried out of the procedure. (4) (c) -return address placed on stack -along with values of parameters -parameters read off stack by procedure -any returning values placed on stack by procedure -return to address at top of stack at end of procedure. (1 per -, max 4) (4) © UCLES 2006 www.xtremepapers.net