SlideShare a Scribd company logo
1 of 6
Download to read offline
UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS
GCE Advanced Level




MARK SCHEME for the October/November 2009 question paper
for the guidance of teachers



                                9691 COMPUTING
        9691/31              Paper 31 (Written), maximum raw mark 90



This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examinersā€™ meeting before marking began,
which would have considered the acceptability of alternative answers.

Mark schemes must be read in conjunction with the question papers and the report on the
examination.



ā€¢   CIE will not enter into discussions or correspondence in connection with these mark schemes.



CIE is publishing the mark schemes for the October/November 2009 question papers for most IGCSE,
GCE Advanced Level and Advanced Subsidiary Level syllabuses and some Ordinary Level
syllabuses.




                            www.xtremepapers.net
Page 2               Mark Scheme: Teachersā€™ version                    Syllabus         Paper
                      GCE A LEVEL ā€“ October/November 2009                   9691             31

1   (a) Any sensible organisation e.g. supermarket.


    (b) e.g. for a supermarket:
        -Customer names and addresses from deliveries
             -valuable to advertisers/gives a breakdown of who the typical shopper is from their
              neighborhood
        -Amounts of goods sold in period of time
             -allows comparison between brands to ensure popular brand stocked/ to act as
              bargaining tool when setting costs of goods
        -Bank account details/credit card details linked to addresses
             -Mail order companies to know who to send expensive offers to
        -Goods bought by individual shoppers
             -to sell to mail order companies/aimed mailshots
        -Sales over different parts of the store
             -to help with designing layout to maximise profits
        -Individuals who respond to mailshots/offers
             -target offers at responsive customers.

        (1 per -, max 3 pairs, max 6)                                                               [6]


2   (a) -Intranet is a closed/private network rather than open/public network
        -More secure because access controlled by bankā€¦
        -by use of IDs and passwords
        -level of access
        -cuts down on time wasted on junk mail/unsuitable material.
        -All important because the information is very sensitive.
        (1 per -, max 4)                                                                            [4]


    (b) Problems:
        -Hackers attack communications
        -Hackers attack customer data
        -Data being distributed leading to unsolicited communications
        Measures:
        -Encrypting data
        -Digital signatures to guarantee reliability of source
        -Passwords to enter userā€™s area/database
        -Use of firewall to block unwanted access
        -Workers subject to D.P. legislation
        -Portable storage devices not allowed.
        (1 per -, max 2 for concerns, max 4 for solutions, max 5)                                   [5]


3   (a) Marks points:
        -Address in instruction is decoded
        -Contents of that memory location contain an address
        -The address of the data to be used.                                                        [3]


    (b) -Some areas of memory cannot be addressed because size of memory address > space
        available in instruction
        -Memory address will fit in a memory location                                               [2]



                                            Ā© UCLES 2009


                              www.xtremepapers.net
Page 3                Mark Scheme: Teachersā€™ version                       Syllabus   Paper
                       GCE A LEVEL ā€“ October/November 2009                      9691       31

4   (a) -Terminal (with small amount of processing power)
        -Normal peripherals of mouse/key board/screen/printer
        -Storage in form of hard drive (to store confidential documents)
        -Storage in form of flash memory/cartridgeā€¦ (to allow portability of data)
        (1 per -, max 3)                                                                          [3]


    (b) -Cable
             -fixes position of machine
             -secure
        -Wireless
             -can move machine and yet remain in contact
             -insecure, subject to hacking/eavesdropping.
        -coax cable
             -cheap to install for school
        -fibre-optic connection
             -more secure/faster transmission of data
        (1 for two methods; 1 each for comparisons; 1 for general point. Max 3)                   [3]


    (c) (i) -Individual who can be covered for time off/Whole group who could be trained en masse
            if school admin did not function
            -Learning about system requirements/learning about the use of the software
            -Comparison between technical and user requirements
            (1 per -, max 2)                                                                    [2]

        (ii) -Can be done in own time
             -At own pace
             -No personality clashes with tutor
             -Can learn on actual software to be used
             -Done without affecting running of school/no down time
             -Electronic, so progress can be automatically monitored.
             (1 per -, max 4)                                                                     [4]


    (d) (i) Advantage: Searching is quicker because a binary search can be used.
            Disadvantage: When index needs changing many of the contents must be moved.           [2]

        (ii) -Insert details in file
             -Insert index entry in one of free space list
             -Start from head of list pointer
             Repeat
             -If points to value > new student
                  -Then alter pointers to insert new value here in list. End
                  -Else follow pointer to new value to compare
             -Until no more values in list
             -Insert new value and move null pointer. End
             (1 per -, max 6)                                                                     [6]




                                             Ā© UCLES 2009


                               www.xtremepapers.net
Page 4               Mark Scheme: Teachersā€™ version                      Syllabus      Paper
                      GCE A LEVEL ā€“ October/November 2009                     9691          31

5   -Address of instruction copies from PC to MAR
    -PC incremented
    -Instruction at address stored in MAR copied to MDR/MBR
    -Instruction copied from MDR/MBR to CIR
    -Instruction code in CIR is decoded
    -Address in CIR copied to MAR
    -Because Jump instruction, address in MAR copied to PC
    (1 per -, max 6)                                                                               [6]


6   Lexical:
    -Instructions are tokenised
    -Some of characters must be combined to create token for keyword
    -If keyword does not exist in internal dictionary of keywords
    -check for valid variable name
    -against rules stated in BNF
    -Error is reported
    Syntax:
    -Each keyword has an associated syntax
    -Tokens are checked to ensure that they match the syntax for that keyword.
    - e.g. Do left and right brackets match?/Does punctuation for Print keyword match rules?/ā€¦
    -error is reported (only credit once)
    (1 per -, max 5)                                                                               [5]


7   (a) (i) An application where the output is produced quickly enough to affect the next input.   [1]

       (ii) -Any sensible example e.g. Check a PIN at an ATM machine
            -must be done before offering a service on the card proffered.                         [2]


    (b) -Touch sensor to ensure that window is not opened
        -Pressure sensor/pad by door to sense someone stepping on it
        -Infra-red sensor to pick up body heat of someone in room
        -Sound sensor to hear broken glass if window broken
        -Light sensor to detect when a light beam is broken
        (2 per -, 1 for sensor + 1 for use. N.B. uses are examples, max 3 sensors)                 [6]


8   (a) (i) -A table holding information about the database
            -Used by managers of the database, not users
            -Maps logical database to physical storage
            -Allows existence check on data to be carried out.
            (1 per -, max 2)                                                                       [2]

       (ii) -The language used to allow the manager to write theā€¦
            -description of the data items to be stored in the database                            [2]
            -defines the structure of the tables.

       (iii) -Language used allow user to access dataā€¦
             -store dataā€¦
             -change data in a database
             -search for data in the database.
             (1 per -, max 2)                                                                      [2]



                                           Ā© UCLES 2009


                             www.xtremepapers.net
Page 5               Mark Scheme: Teachersā€™ version                    Syllabus         Paper
                      GCE A LEVEL ā€“ October/November 2009                   9691             31

    (b) (i) -Most items of data only need to be stored onceā€¦
            -because tables are linked allowing the contents of all tables to be used via access to
            one.                                                                                    [2]

       (ii) -Access to areas of data can be easily controlled becauseā€¦
            -users each have their own view of data
            -DBMS can control views using access rights.
            -Regular back ups of the data can be madeā€¦
            -automatically by the DBMS to alternative hardware.
            (1 per -, max 2)                                                                        [2]

       (iii) -less chance of contradictions being caused
             -as most information is only stored once.
             -data protected from misguided or malicious processing/alteration
             -leading user to trust in the correctness of the data
             (1 per -, max 2)                                                                       [2]


9   (a) (i) Only one user has access at a time.                                                     [1]

       (ii) -Application Programming Interface
                  -provides platform to run software
            -file management
                  -manipulation of files
            -memory management
                  -paging/virtual memory/scheduling
            -processor management
                  -interrupt handling/scheduling
            -I/O management / handles data transfers
                  -between areas of processor/between primary memory and secondary storage.
            -device drivers / handles data between processor and I/O peripherals
                  -using instructions in device drivers and control of buffers
            - user interface
                  -a method of communicating with computer/suitable example
            -Utility software
                  -offers series of software to carry out housekeeping/monitor and maintain and use
                  the hardware.
            -Security/privacy
                  -will protect data by copying to other media automatically/sets up passwords to
                  restrict access to files.
            (1 per -, max 2 components, max 4)                                                      [4]


    (b) (i) -O.S. hides the complexities of the system from users.
            -User believes that their computer is a stand-alone.
            -User is unaware of sharing resources.
            (1 per -, max 2)                                                                        [2]

       (ii) -Sets up files and directories for user.
            -Allows group access to some files.
            -Access to files dictated by user I.D.
            (1 per -, max 2)                                                                        [2]




                                            Ā© UCLES 2009


                              www.xtremepapers.net
Page 6             Mark Scheme: Teachersā€™ version                     Syllabus   Paper
                     GCE A LEVEL ā€“ October/November 2009                    9691       31

10      (i) -Information must be collected before anything else is done.
            -Documentation is done alongside all other tasks
            -Information must be analysed before solution attempted.
            -Data files can be created alongside problem solution.
            -Design must be completed before software can be written.
            -Design and software can be done alongside data files.
            -Testing must be documented.
            -Project must be finished before implementation.
            (1 per -, max 6)                                                                  [6]

       (ii) -Critical Path: AGH or ABDFH.                                                     [1]

       (iii) -Least Time: 29 days.                                                            [1]




                                            Ā© UCLES 2009


                             www.xtremepapers.net

More Related Content

What's hot

June 07 MS1
June 07 MS1June 07 MS1
June 07 MS1Samimvez
Ā 
June 05 MS1
June 05 MS1June 05 MS1
June 05 MS1Samimvez
Ā 
June 10 MS32
June 10 MS32June 10 MS32
June 10 MS32Samimvez
Ā 
Nov 07 MS3
Nov 07 MS3Nov 07 MS3
Nov 07 MS3Samimvez
Ā 
June 06 MS1
June 06 MS1June 06 MS1
June 06 MS1Samimvez
Ā 
June 06 MS3
June 06 MS3June 06 MS3
June 06 MS3Samimvez
Ā 
June 08 MS3
June 08 MS3June 08 MS3
June 08 MS3Samimvez
Ā 
June 05 MS3
June 05 MS3June 05 MS3
June 05 MS3Samimvez
Ā 
June 04 MS
June 04 MSJune 04 MS
June 04 MSSamimvez
Ā 
Lecture 1
Lecture 1Lecture 1
Lecture 10143998965
Ā 

What's hot (10)

June 07 MS1
June 07 MS1June 07 MS1
June 07 MS1
Ā 
June 05 MS1
June 05 MS1June 05 MS1
June 05 MS1
Ā 
June 10 MS32
June 10 MS32June 10 MS32
June 10 MS32
Ā 
Nov 07 MS3
Nov 07 MS3Nov 07 MS3
Nov 07 MS3
Ā 
June 06 MS1
June 06 MS1June 06 MS1
June 06 MS1
Ā 
June 06 MS3
June 06 MS3June 06 MS3
June 06 MS3
Ā 
June 08 MS3
June 08 MS3June 08 MS3
June 08 MS3
Ā 
June 05 MS3
June 05 MS3June 05 MS3
June 05 MS3
Ā 
June 04 MS
June 04 MSJune 04 MS
June 04 MS
Ā 
Lecture 1
Lecture 1Lecture 1
Lecture 1
Ā 

Similar to Nov 09 MS31

Nov 09 MS32
Nov 09 MS32Nov 09 MS32
Nov 09 MS32Samimvez
Ā 
June 10 MS11
June 10 MS11June 10 MS11
June 10 MS11Samimvez
Ā 
June 10 MS12
June 10 MS12June 10 MS12
June 10 MS12Samimvez
Ā 
Nov 07 MS1
Nov 07 MS1Nov 07 MS1
Nov 07 MS1Samimvez
Ā 
Nov 06 MS3
Nov 06 MS3Nov 06 MS3
Nov 06 MS3Samimvez
Ā 
Nov 08 MS1
Nov 08 MS1Nov 08 MS1
Nov 08 MS1Samimvez
Ā 
June 10 MS13
June 10 MS13June 10 MS13
June 10 MS13Samimvez
Ā 
Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 1
Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 1Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 1
Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 1Alpro
Ā 
Computing 9691 Mark Scheme for May / June 2007 Cambridge
Computing 9691 Mark Scheme for May / June 2007 CambridgeComputing 9691 Mark Scheme for May / June 2007 Cambridge
Computing 9691 Mark Scheme for May / June 2007 CambridgeAlpro
Ā 
June 10 MS33
June 10 MS33June 10 MS33
June 10 MS33Samimvez
Ā 
June 09 MS1
June 09 MS1June 09 MS1
June 09 MS1Samimvez
Ā 
Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 3
Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 3Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 3
Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 3Alpro
Ā 
Mark Scheme for May June 2008 Question Paper Computing 9691 Computers Zimbabwe
Mark Scheme for May June 2008 Question Paper Computing 9691 Computers ZimbabweMark Scheme for May June 2008 Question Paper Computing 9691 Computers Zimbabwe
Mark Scheme for May June 2008 Question Paper Computing 9691 Computers ZimbabweAlpro
Ā 
Nov 06 MS1
Nov 06 MS1Nov 06 MS1
Nov 06 MS1Samimvez
Ā 
Nov 04 MS1
Nov 04 MS1Nov 04 MS1
Nov 04 MS1Samimvez
Ā 
June 03 MS1
June 03 MS1June 03 MS1
June 03 MS1Samimvez
Ā 
June 08 MS1
June 08 MS1June 08 MS1
June 08 MS1Samimvez
Ā 
Nov 09 P31
Nov 09 P31Nov 09 P31
Nov 09 P31Samimvez
Ā 
Computing 9691 Test Paper Question Paper Paper 3 (Written paper 3) for May / ...
Computing 9691 Test Paper Question Paper Paper 3 (Written paper 3) for May / ...Computing 9691 Test Paper Question Paper Paper 3 (Written paper 3) for May / ...
Computing 9691 Test Paper Question Paper Paper 3 (Written paper 3) for May / ...Alpro
Ā 
Lab onedesignwriteup
Lab onedesignwriteupLab onedesignwriteup
Lab onedesignwriteupChris Franklin
Ā 

Similar to Nov 09 MS31 (20)

Nov 09 MS32
Nov 09 MS32Nov 09 MS32
Nov 09 MS32
Ā 
June 10 MS11
June 10 MS11June 10 MS11
June 10 MS11
Ā 
June 10 MS12
June 10 MS12June 10 MS12
June 10 MS12
Ā 
Nov 07 MS1
Nov 07 MS1Nov 07 MS1
Nov 07 MS1
Ā 
Nov 06 MS3
Nov 06 MS3Nov 06 MS3
Nov 06 MS3
Ā 
Nov 08 MS1
Nov 08 MS1Nov 08 MS1
Nov 08 MS1
Ā 
June 10 MS13
June 10 MS13June 10 MS13
June 10 MS13
Ā 
Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 1
Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 1Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 1
Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 1
Ā 
Computing 9691 Mark Scheme for May / June 2007 Cambridge
Computing 9691 Mark Scheme for May / June 2007 CambridgeComputing 9691 Mark Scheme for May / June 2007 Cambridge
Computing 9691 Mark Scheme for May / June 2007 Cambridge
Ā 
June 10 MS33
June 10 MS33June 10 MS33
June 10 MS33
Ā 
June 09 MS1
June 09 MS1June 09 MS1
June 09 MS1
Ā 
Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 3
Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 3Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 3
Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 3
Ā 
Mark Scheme for May June 2008 Question Paper Computing 9691 Computers Zimbabwe
Mark Scheme for May June 2008 Question Paper Computing 9691 Computers ZimbabweMark Scheme for May June 2008 Question Paper Computing 9691 Computers Zimbabwe
Mark Scheme for May June 2008 Question Paper Computing 9691 Computers Zimbabwe
Ā 
Nov 06 MS1
Nov 06 MS1Nov 06 MS1
Nov 06 MS1
Ā 
Nov 04 MS1
Nov 04 MS1Nov 04 MS1
Nov 04 MS1
Ā 
June 03 MS1
June 03 MS1June 03 MS1
June 03 MS1
Ā 
June 08 MS1
June 08 MS1June 08 MS1
June 08 MS1
Ā 
Nov 09 P31
Nov 09 P31Nov 09 P31
Nov 09 P31
Ā 
Computing 9691 Test Paper Question Paper Paper 3 (Written paper 3) for May / ...
Computing 9691 Test Paper Question Paper Paper 3 (Written paper 3) for May / ...Computing 9691 Test Paper Question Paper Paper 3 (Written paper 3) for May / ...
Computing 9691 Test Paper Question Paper Paper 3 (Written paper 3) for May / ...
Ā 
Lab onedesignwriteup
Lab onedesignwriteupLab onedesignwriteup
Lab onedesignwriteup
Ā 

More from Samimvez

Sql installation tutorial
Sql installation tutorialSql installation tutorial
Sql installation tutorialSamimvez
Ā 
Example3
Example3Example3
Example3Samimvez
Ā 
Coms1010 exam paper - nov10
Coms1010   exam paper - nov10Coms1010   exam paper - nov10
Coms1010 exam paper - nov10Samimvez
Ā 
Coms1010 exam paper - may 08
Coms1010   exam paper - may 08Coms1010   exam paper - may 08
Coms1010 exam paper - may 08Samimvez
Ā 
Example2
Example2Example2
Example2Samimvez
Ā 
Labsheet 3
Labsheet 3Labsheet 3
Labsheet 3Samimvez
Ā 
Labsheet 3,5
Labsheet 3,5Labsheet 3,5
Labsheet 3,5Samimvez
Ā 
EQ V3x
EQ V3xEQ V3x
EQ V3xSamimvez
Ā 
Eq v2
Eq v2Eq v2
Eq v2Samimvez
Ā 
3.10
3.103.10
3.10Samimvez
Ā 
Nov 05 P3
Nov 05 P3Nov 05 P3
Nov 05 P3Samimvez
Ā 

More from Samimvez (20)

Sql installation tutorial
Sql installation tutorialSql installation tutorial
Sql installation tutorial
Ā 
Example3
Example3Example3
Example3
Ā 
Coms1010 exam paper - nov10
Coms1010   exam paper - nov10Coms1010   exam paper - nov10
Coms1010 exam paper - nov10
Ā 
Coms1010 exam paper - may 08
Coms1010   exam paper - may 08Coms1010   exam paper - may 08
Coms1010 exam paper - may 08
Ā 
Example2
Example2Example2
Example2
Ā 
Labsheet 3
Labsheet 3Labsheet 3
Labsheet 3
Ā 
Labsheet 3,5
Labsheet 3,5Labsheet 3,5
Labsheet 3,5
Ā 
EQ V3x
EQ V3xEQ V3x
EQ V3x
Ā 
Eq v2
Eq v2Eq v2
Eq v2
Ā 
3.6
3.63.6
3.6
Ā 
3.2
3.23.2
3.2
Ā 
3.10
3.103.10
3.10
Ā 
3.1
3.13.1
3.1
Ā 
3.3
3.33.3
3.3
Ā 
3.8
3.83.8
3.8
Ā 
3.4
3.43.4
3.4
Ā 
3.7
3.73.7
3.7
Ā 
3.5
3.53.5
3.5
Ā 
3.9
3.93.9
3.9
Ā 
Nov 05 P3
Nov 05 P3Nov 05 P3
Nov 05 P3
Ā 

Recently uploaded

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
Ā 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
Ā 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
Ā 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
Ā 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
Ā 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
Ā 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
Ā 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
Ā 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
Ā 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
Ā 
Nellā€™iperspazio con Rocket: il Framework Web di Rust!
Nellā€™iperspazio con Rocket: il Framework Web di Rust!Nellā€™iperspazio con Rocket: il Framework Web di Rust!
Nellā€™iperspazio con Rocket: il Framework Web di Rust!Commit University
Ā 
Bun (KitWorks Team Study ė…øė³„ė§ˆė£Ø ė°œķ‘œ 2024.4.22)
Bun (KitWorks Team Study ė…øė³„ė§ˆė£Ø ė°œķ‘œ 2024.4.22)Bun (KitWorks Team Study ė…øė³„ė§ˆė£Ø ė°œķ‘œ 2024.4.22)
Bun (KitWorks Team Study ė…øė³„ė§ˆė£Ø ė°œķ‘œ 2024.4.22)Wonjun Hwang
Ā 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
Ā 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
Ā 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
Ā 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
Ā 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
Ā 

Recently uploaded (20)

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
Ā 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
Ā 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
Ā 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
Ā 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
Ā 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Ā 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
Ā 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
Ā 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Ā 
Hot Sexy call girls in Panjabi Bagh šŸ” 9953056974 šŸ” Delhi escort Service
Hot Sexy call girls in Panjabi Bagh šŸ” 9953056974 šŸ” Delhi escort ServiceHot Sexy call girls in Panjabi Bagh šŸ” 9953056974 šŸ” Delhi escort Service
Hot Sexy call girls in Panjabi Bagh šŸ” 9953056974 šŸ” Delhi escort Service
Ā 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
Ā 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
Ā 
Nellā€™iperspazio con Rocket: il Framework Web di Rust!
Nellā€™iperspazio con Rocket: il Framework Web di Rust!Nellā€™iperspazio con Rocket: il Framework Web di Rust!
Nellā€™iperspazio con Rocket: il Framework Web di Rust!
Ā 
Bun (KitWorks Team Study ė…øė³„ė§ˆė£Ø ė°œķ‘œ 2024.4.22)
Bun (KitWorks Team Study ė…øė³„ė§ˆė£Ø ė°œķ‘œ 2024.4.22)Bun (KitWorks Team Study ė…øė³„ė§ˆė£Ø ė°œķ‘œ 2024.4.22)
Bun (KitWorks Team Study ė…øė³„ė§ˆė£Ø ė°œķ‘œ 2024.4.22)
Ā 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Ā 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
Ā 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
Ā 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Ā 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
Ā 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
Ā 

Nov 09 MS31

  • 1. UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS GCE Advanced Level MARK SCHEME for the October/November 2009 question paper for the guidance of teachers 9691 COMPUTING 9691/31 Paper 31 (Written), maximum raw mark 90 This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the details of the discussions that took place at an Examinersā€™ meeting before marking began, which would have considered the acceptability of alternative answers. Mark schemes must be read in conjunction with the question papers and the report on the examination. ā€¢ CIE will not enter into discussions or correspondence in connection with these mark schemes. CIE is publishing the mark schemes for the October/November 2009 question papers for most IGCSE, GCE Advanced Level and Advanced Subsidiary Level syllabuses and some Ordinary Level syllabuses. www.xtremepapers.net
  • 2. Page 2 Mark Scheme: Teachersā€™ version Syllabus Paper GCE A LEVEL ā€“ October/November 2009 9691 31 1 (a) Any sensible organisation e.g. supermarket. (b) e.g. for a supermarket: -Customer names and addresses from deliveries -valuable to advertisers/gives a breakdown of who the typical shopper is from their neighborhood -Amounts of goods sold in period of time -allows comparison between brands to ensure popular brand stocked/ to act as bargaining tool when setting costs of goods -Bank account details/credit card details linked to addresses -Mail order companies to know who to send expensive offers to -Goods bought by individual shoppers -to sell to mail order companies/aimed mailshots -Sales over different parts of the store -to help with designing layout to maximise profits -Individuals who respond to mailshots/offers -target offers at responsive customers. (1 per -, max 3 pairs, max 6) [6] 2 (a) -Intranet is a closed/private network rather than open/public network -More secure because access controlled by bankā€¦ -by use of IDs and passwords -level of access -cuts down on time wasted on junk mail/unsuitable material. -All important because the information is very sensitive. (1 per -, max 4) [4] (b) Problems: -Hackers attack communications -Hackers attack customer data -Data being distributed leading to unsolicited communications Measures: -Encrypting data -Digital signatures to guarantee reliability of source -Passwords to enter userā€™s area/database -Use of firewall to block unwanted access -Workers subject to D.P. legislation -Portable storage devices not allowed. (1 per -, max 2 for concerns, max 4 for solutions, max 5) [5] 3 (a) Marks points: -Address in instruction is decoded -Contents of that memory location contain an address -The address of the data to be used. [3] (b) -Some areas of memory cannot be addressed because size of memory address > space available in instruction -Memory address will fit in a memory location [2] Ā© UCLES 2009 www.xtremepapers.net
  • 3. Page 3 Mark Scheme: Teachersā€™ version Syllabus Paper GCE A LEVEL ā€“ October/November 2009 9691 31 4 (a) -Terminal (with small amount of processing power) -Normal peripherals of mouse/key board/screen/printer -Storage in form of hard drive (to store confidential documents) -Storage in form of flash memory/cartridgeā€¦ (to allow portability of data) (1 per -, max 3) [3] (b) -Cable -fixes position of machine -secure -Wireless -can move machine and yet remain in contact -insecure, subject to hacking/eavesdropping. -coax cable -cheap to install for school -fibre-optic connection -more secure/faster transmission of data (1 for two methods; 1 each for comparisons; 1 for general point. Max 3) [3] (c) (i) -Individual who can be covered for time off/Whole group who could be trained en masse if school admin did not function -Learning about system requirements/learning about the use of the software -Comparison between technical and user requirements (1 per -, max 2) [2] (ii) -Can be done in own time -At own pace -No personality clashes with tutor -Can learn on actual software to be used -Done without affecting running of school/no down time -Electronic, so progress can be automatically monitored. (1 per -, max 4) [4] (d) (i) Advantage: Searching is quicker because a binary search can be used. Disadvantage: When index needs changing many of the contents must be moved. [2] (ii) -Insert details in file -Insert index entry in one of free space list -Start from head of list pointer Repeat -If points to value > new student -Then alter pointers to insert new value here in list. End -Else follow pointer to new value to compare -Until no more values in list -Insert new value and move null pointer. End (1 per -, max 6) [6] Ā© UCLES 2009 www.xtremepapers.net
  • 4. Page 4 Mark Scheme: Teachersā€™ version Syllabus Paper GCE A LEVEL ā€“ October/November 2009 9691 31 5 -Address of instruction copies from PC to MAR -PC incremented -Instruction at address stored in MAR copied to MDR/MBR -Instruction copied from MDR/MBR to CIR -Instruction code in CIR is decoded -Address in CIR copied to MAR -Because Jump instruction, address in MAR copied to PC (1 per -, max 6) [6] 6 Lexical: -Instructions are tokenised -Some of characters must be combined to create token for keyword -If keyword does not exist in internal dictionary of keywords -check for valid variable name -against rules stated in BNF -Error is reported Syntax: -Each keyword has an associated syntax -Tokens are checked to ensure that they match the syntax for that keyword. - e.g. Do left and right brackets match?/Does punctuation for Print keyword match rules?/ā€¦ -error is reported (only credit once) (1 per -, max 5) [5] 7 (a) (i) An application where the output is produced quickly enough to affect the next input. [1] (ii) -Any sensible example e.g. Check a PIN at an ATM machine -must be done before offering a service on the card proffered. [2] (b) -Touch sensor to ensure that window is not opened -Pressure sensor/pad by door to sense someone stepping on it -Infra-red sensor to pick up body heat of someone in room -Sound sensor to hear broken glass if window broken -Light sensor to detect when a light beam is broken (2 per -, 1 for sensor + 1 for use. N.B. uses are examples, max 3 sensors) [6] 8 (a) (i) -A table holding information about the database -Used by managers of the database, not users -Maps logical database to physical storage -Allows existence check on data to be carried out. (1 per -, max 2) [2] (ii) -The language used to allow the manager to write theā€¦ -description of the data items to be stored in the database [2] -defines the structure of the tables. (iii) -Language used allow user to access dataā€¦ -store dataā€¦ -change data in a database -search for data in the database. (1 per -, max 2) [2] Ā© UCLES 2009 www.xtremepapers.net
  • 5. Page 5 Mark Scheme: Teachersā€™ version Syllabus Paper GCE A LEVEL ā€“ October/November 2009 9691 31 (b) (i) -Most items of data only need to be stored onceā€¦ -because tables are linked allowing the contents of all tables to be used via access to one. [2] (ii) -Access to areas of data can be easily controlled becauseā€¦ -users each have their own view of data -DBMS can control views using access rights. -Regular back ups of the data can be madeā€¦ -automatically by the DBMS to alternative hardware. (1 per -, max 2) [2] (iii) -less chance of contradictions being caused -as most information is only stored once. -data protected from misguided or malicious processing/alteration -leading user to trust in the correctness of the data (1 per -, max 2) [2] 9 (a) (i) Only one user has access at a time. [1] (ii) -Application Programming Interface -provides platform to run software -file management -manipulation of files -memory management -paging/virtual memory/scheduling -processor management -interrupt handling/scheduling -I/O management / handles data transfers -between areas of processor/between primary memory and secondary storage. -device drivers / handles data between processor and I/O peripherals -using instructions in device drivers and control of buffers - user interface -a method of communicating with computer/suitable example -Utility software -offers series of software to carry out housekeeping/monitor and maintain and use the hardware. -Security/privacy -will protect data by copying to other media automatically/sets up passwords to restrict access to files. (1 per -, max 2 components, max 4) [4] (b) (i) -O.S. hides the complexities of the system from users. -User believes that their computer is a stand-alone. -User is unaware of sharing resources. (1 per -, max 2) [2] (ii) -Sets up files and directories for user. -Allows group access to some files. -Access to files dictated by user I.D. (1 per -, max 2) [2] Ā© UCLES 2009 www.xtremepapers.net
  • 6. Page 6 Mark Scheme: Teachersā€™ version Syllabus Paper GCE A LEVEL ā€“ October/November 2009 9691 31 10 (i) -Information must be collected before anything else is done. -Documentation is done alongside all other tasks -Information must be analysed before solution attempted. -Data files can be created alongside problem solution. -Design must be completed before software can be written. -Design and software can be done alongside data files. -Testing must be documented. -Project must be finished before implementation. (1 per -, max 6) [6] (ii) -Critical Path: AGH or ABDFH. [1] (iii) -Least Time: 29 days. [1] Ā© UCLES 2009 www.xtremepapers.net