NQ Computing AdvH SQP May05
NQ Computing AdvH SQP May05
Computing NATIONAL
Advanced Higher QUALIFICATIONS
Contents Page
[C206/SQP257] 1
Course Assessment Specification
Part 1
This part of the Course Assessment Specification details the structure of the
Question Paper for this Course
Section I - 60 marks
♦ consists of questions requiring extended responses demonstrating structuring
and reasoning
♦ questions have varying mark allocation and therefore do not have to be of the
same length. Most questions will subdivided into a number of connected parts
with the marks for each part clearly indicated.
♦ questions will involve both knowledge and understanding and problem
solving, and will be set in a range of contexts
♦ approximately 20 marks will be for knowledge and understanding
♦ approximately 40 marks will be for problem solving
♦ questions will sample across the content statements associated with the
mandatory units (Software Development and Developing a Software Solution)
♦ some questions, or parts of questions, will require integration of knowledge
from the two mandatory units
♦ candidates will be expected to tackle all questions in the section.
Section II - 60 marks
♦ this section has three sub-sections, one for each of the optional units (Artificial
Intelligence, Computer Networking and Computer Architecture)
♦ candidates will be expected to tackle all the questions within one sub-section
♦ each sub-section consists of questions requiring extended responses
demonstrating structuring and reasoning
[C206/SQP257] 2 Page 2
♦ questions have varying mark allocation and therefore do not have to be of the
same length. Most questions will subdivided into a number of connected parts
with the marks for each part clearly indicated.
♦ questions will involve both knowledge and understanding and problem
solving, and will be set in a range of contexts
♦ approximately 20 marks will be for knowledge and understanding
♦ approximately 40 of the marks will be for problem solving
♦ questions in each sub-section will sample across the content statements
associated with the appropriate optional unit
♦ some questions, or parts of questions, will require integration of knowledge
from the mandatory units.
[C206/SQP257] 3 Page 3
Part 2
This part of the Course Assessment Specification details the structure of the
Practical Coursework Task in this Course.
♦ The task provides the candidate with the opportunity to demonstrate and
integrate practical skills and knowledge they have developed within the
mandatory units (Software Development and Developing a Software Solution)
in a more complex and less familiar context than is possible within the units
♦ The task may be undertaken in “open book” conditions, but under supervision
of the teacher/lecturer, to ensure that the work presented is the candidate’s
own work
♦ Where a number of candidates undertake a collaborative project, the teacher/
lecturer must ensure that each candidate’s individual contribution can be
clearly identified and assessed
♦ The task will be marked by the teacher/lecturer, using a marking scheme
provided by SQA, but be subject to moderation
♦ The candidate is required to submit
- the problem specification
- evidence of project planning
- evidence of a completed solution (preferably files on a CD plus hard
copy of coding/data files, screen shots)
- user documentation and technical documentation
- an evaluation report
♦ The marking scheme will provide a mark out of 80, which will be submitted
directly to SQA without scaling
♦ The teacher or lecturer may give the candidate guidance and/or help if
requested. Any significant help should be reflected in the marks awarded
♦ Once the task has been completed and marked, it should not be returned to the
candidate for further work.
[C206/SQP257] 4 Page 4
Part 3
The mark range for each component takes account of the weighting of each
component.
In National Qualifications cut-off scores should be set at approximately 70% for grade
A and 50% for grade C with grade B falling midway.
For a total mark range of 0-200, the following gives an indication of the cut-off scores
based on the candidate’s total score.
These cut-off scores may be lowered if question paper component turns out to be
more demanding or raised if less demanding.
Worked example
♦ In a centre’s own prelim, a candidate scores 88/120, and the candidate scores
37/80 in the practical coursework
♦ The two marks are added together, giving a total of 125/200
♦ The centre’s view is that their own prelim is slightly less demanding than SQA
examination.
♦ Using the mark range, a realistic estimate may be band 5 rather than band 4.
[C206/SQP257] 5 Page 5
[C206/SQP257] 6 Page 6
C206/SQP257
Section II has three parts: answer questions from any one of the parts A, B, or C.
[C206/SQP257] 7 ©
SECTION I — Software Development & Developing a Software Solution
Answer ALL questions in this part
Marks
1. The Principal of Clydeside College would like to introduce a computerised system to
replace the current manual system that is used to process student enrolments at the
start of each new academic session.
The Principal has discussed the possible benefits of a computerised system with the
College Administration Department and with each Head of Faculty. Together, they
have produced a project proposal which outlines their plans for the new computerised
system.
(a) The Principal decides to employ a team of systems analysts to study the project
proposal and develop a computerised enrolment system that meets the College
requirements.
The team of systems analysts will be involved in a number of activities
including:
• carrying out a feasibility study
• producing an operational requirements document.
For each of the activities listed above, describe in detail what is meant by the
term shown in italics and what would be involved at this stage of the analysis in
relation to the college enrolment system. 6
(b) The result of the analysis stage of the software development process will be an
operational requirements document. State one difference between an
operational requirements document and a system specification. 2
(c) Once the system specification has been produced, the design team begin to work
on the design of the new computerised system. An important part of the
designers’ work is to consider a suitable interface for the new enrolment system.
Look carefully at the interfaces shown below.
Interface A Interface B
(f) Once the system has been implemented, testing is carried out.
(i) Explain the need for both component and module testing. 2
(ii) Explain how trace tables and breakpoints are used in the testing process. 2
(g) On completion of the project, the solution is evaluated. In the evaluation, there
are comments about the use made by the development team of user-defined
modules and CASE tools.
(i) Explain why the use of user-defined module libraries can lead to a
reduction in development time. 2
(ii) Identify two benefits to the development team of using CASE tools. 2
(b) The above expression is transformed into the following sequence of symbols:
9 2 - 3 4 + *
This sequence of symbols is then processed using a stack by applying the
following algorithm:
start loop
get next symbol
if symbol is a number then
add symbol to top of stack
end if
if symbol is an operator then
remove the top two items from the stack and carry out
the operation on these values
add the result to the top of the stack
end if
end loop
Using a diagram, show the state of the stack after the “3” has been added to it. 2
(c) Give the upper limit of the size of the stack needed in this case. 1
3. A printer buffer uses a queue data structure to hold items of data that are to be printed.
Explain how a queue data structure can be used to hold and process items in the
printer buffer queue. Draw a labelled diagram to illustrate your answer. 4
(a) Describe how you would store the competitors’ details using a record data type
(you should assume that a record data type exists in the language selected for
implementation of the program). You may illustrate your answer in a
programming language of your choice. 3
(b) Describe how you would store the competitors’ details without using a record
data type (you should assume that the language selected for implementation of
the program does not support a record data type). You may illustrate your
answer in a programming language of your choice. 4
(b) State three data items, other than the list of names and the name being searched
for, that would be required to implement the binary search algorithm and explain
how these data items are used in the algorithm. 4
show that the binary search algorithm uses fewer comparisons than the linear
search algorithm to find the name Mhairi. 3
(d) In what circumstances would the linear search algorithm use fewer comparisons
than the binary search algorithm? Explain your answer. 2
(e) The programmers would like to add a sort feature to the program so that when a
new name is added, the list of names is automatically sorted into alphabetical
order. The possible algorithms are selection sort, simple sort and bubble sort.
(i) Describe how a simple sort works. 2
(ii) Most sort algorithms work in place, ie by rearranging the given array
without using additional temporary memory. Which algorithm does need
additional temporary memory? Explain your answer. 2
(iii) Explain why the bubble sort algorithm is best when the list is already
partially sorted. 1
(60)
[END OF SECTION I]
(a) Describe two benefits that can be claimed for the provision of certainty factors. 4
(b) Why might some expert systems not provide certainty factors? 2
(c) The following rules are created to give a certainty factor (CF) between 0 and 1 to
the chances of someone being able to play basketball:
IF is-tall(X)
AND has-good-coordination (X)
THEN could-play-basketball(X) CF 0.5
If the expert system has already concluded that is-tall(fred) with CF 0.3 and
has-good-coordination(fred) with CF 0.8 then what would be the certainty
factor of could-play-basketball(fred)? 3
7. An early AI program uses forward chaining and works by matching its rules against
the user’s last sentence. The selection of a rule to fire is based on fixed strategies,
known as conflict resolution strategies. Describe two strategies that can be used to
decide which rule to fire. 4
• If the robot’s location is above a non-empty pallet, it may transfer the top box
from this pallet onto another pallet. Thus, the robot can transform the scene
shown in scene S1 into the one shown in scene S2.
• The robot can move from one location to another directly above a pallet without
transferring any box. Thus, scene S2 can be transformed into scene S3 by this
operation.
rail
robot
Numbered
boxes
1
2 3
pallet
S1
Question 8 is continued on the next page
[C206/SQP257] 14 Page eight
Marks
2 33 1
S2
2 3 1
S3
(b) In a typical problem, the robot’s task is to transform scene Sl into the scene
shown below by a suitable sequence of operations.
(i) Write down the symbolic representation of this problem’s goal state. 1
(ii) Draw part of a search tree for the problem, labeling each node with the
appropriate symbolic state representation. Your tree should show all
states reachable from scene Sl within two operations. One branch, which
you should identify clearly, should be extended further to reveal a solution
to the problem. 6
(iii) Ideally, the robot’s control software should find very quickly a solution
which requires the fewest operations. Explain why depth-first and
breadth-first search methods may not give rise to ideal performance. 4
Add one point for every block that is resting on the block that it is supposed to be resting on
or is in the correct position resting on the table. Subtract one point for every block that is
NOT resting on the block that it is supposed to be resting on.
(a) Using this function what is the score of the goal state? 1
(b) Using this function what is the score of the initial state? 1
(c) Describe the only possible first move and evaluate the resulting state. 2
(d) There are then three possible second moves. Write down these three moves
using block notation and evaluate each of the states. 3
(e) Explain what would happen next if the hill-climbing heuristic is used. 1
member(X,[X|_]).
?-member(david,[john,mary,david,tom,ann])
15. (a) Name and describe the purpose of two processor registers. 4
(b) Explain what is meant by the term instruction set for a processor. 2
17. A processor has a 32 bit data bus and a 32 bit address bus. The operation code of a
machine instruction occupies 1 byte. Two machine instructions available to the
processor are described below.
(a) (i) What is meant by addressing mode with respect to a machine instruction? 1
(b) The processor must undergo various tests. One section of a test program has an
instruction LODA #N, which must be fetched and executed.
If the program counter is currently set at location 1000hex, what will it be set at
after the instruction LODA #N has been fetched from memory and executed?
Explain how you obtained your answer. 2
(c) The fetch part of the instruction requires reading the contents of the appropriate
memory location.
Describe in detail the operating steps, with reference to the buses and registers
involved, that take place to enable the instruction to be read from memory. 4
18. (a) Explain the advantages of using Direct Memory Access (DMA) over other
techniques, for example software-serviced interrupts, when transferring data
from a disk to main memory. 3
(b) Explain, with the aid of a diagram, one method of implementing DMA. Your
diagram should indicate how DMA techniques make use of the address and data
buses. 3
(c) A certain processor takes 30 nanoseconds to complete one clock cycle. The speed
of memory to carry out a read or write request is 70 nanoseconds.
Name and describe one memory technique which can be used to enable multiple
accesses simultaneously in this situation. 5
21. Operating systems must provide functions such as scheduling programs, managing
data transfers and managing files. Recent operating system designs also aim to adhere
to the “convenience of the user” principle. This allows the user to place more
demands on system resources.
(a) Recent trends have led to operating systems including services and providing
capabilities that were formerly within applications.
(i) Give details of the operating system’s services in terms of:
• providing a standard look and feel for applications
• improving the capability of programs to communicate and pass
data. 4
(ii) Explain why the trend to expand the role of the operating system to
include these services has taken place. 2
Describe what happens when an attempt is made to write the above files using:
(ii) Compare round robin scheduling and multi level feedback queue. Your
explanation should include the effect each type has on system
performance. 4
(d) Name two operating systems and compare how the following tasks could be
accomplished:
(b) (i) A school network system uses TCP/IP. Describe how this protocol can
be mapped onto the OSI model layers. 1
(ii) Explain why the school would benefit from using TCP/IP for its internal
network. 2
23. A school network system has a fibre connection to the local authority intranet. The
local authority acts as an Internet Service Provider (ISP) for the school. For example,
all requests for pages on the World Wide Web from the school go first to the local
authority system and the results of these requests are passed back through the fibre
link to the school.
Internally, the school network uses unshielded twisted pair (UTP) cabling. The school
network consists of approximately 200 personal computers as well as a smaller
number of networked resources such as printers.
(b) Explain why fibre is appropriate for the local authority whilst UTP is more
appropriate for the school. 2
(c) A new science block is built for the school on the other side of a road from the
existing school building.
Explain the advantages and disadvantages to the school of using a wireless
communication method to network the computers in the new science block.
Your answer should refer to
• modern data standards (eg 802.11g)
• security
• performance issues. 6
206.13.01.48/16
(a) Describe CIDR. You may find it helpful to refer to the above example. 5
(b) Show how the CIDR address 206.13.01.48/16 can be considered equivalent to
one Class B IP address. 2
(a) One proposal is to simply allow voters to send their vote by e-mail. Describe
how the following protocols are involved in the sending and receiving votes by
e-mail:
(i) SMTP 3
(ii) POP. 3
(b) The voting e-mail could be a simple text message such as:
Explain why the MIME protocol would not be required to send votes in this
format. 2
(c) One problem with using e-mail to send votes would be ensuring that each
person was only allowed one vote. Part of the solution to this problem could be
to use public-key encryption and digital signatures.
(ii) Explain how these network security methods could be used to help ensure
each person could cast only one vote. 4
(d) An alternative voting method is also being considered which will allow parent
voters to connect to a secure server in the school from their home computers
using a virtual private network.
Explain why a virtual private network protocol (for example PPTP or L2TP)
would make the casting of parents’ votes more secure. 2
(a) Describe how the process of requesting a Web page is handled using each of
these intermediate connections:
• proxy
• gateway
• tunnel. 6
(b) A pupil in the school wishes to access a simulation of a science experiment on a
Web page but discovers that the simulation cannot be used with the basic
installation of the browser software on the school computer.
(i) Describe how the browser functionality can be enhanced using plug-ins
and Java applets. 4
(c) The provider of the on-line web-based science experiment simulation offers a
video telephone helpline.
• hardware;
• software;
• data transmission;
• data compression. 8
(60)
[C206/SQP257] 25 ©
SECTION I — Software Development & Developing a Software Solution
Award 1 mark for correct meaning of each stage; award 2 marks for a full description of
what is involved at each stage. Maximum of 6 marks.
(b) A system specification is a document that states the way that the problem must be
solved whereas a requirements specification states what is required by the solution.
Award 1 mark for clear description of purpose of each. Maximum of 2 marks.
(c) (i) Interface A makes use of drop down lists and radio buttons which means it is
user-friendly and users are more inclined to explore the facilities of the software.
Interface B is a text interface and therefore may be more threatening to less
experienced users.
Award 1 mark for each relevant comment up to a maximum of 2 marks.
(ii) Since Interface A demands less keyboard input than Interface B, there is less
scope for keyboarding errors. It isn’t possible for an invalid course or faculty to
be entered in Interface A whereas it is possible with Interface B.
Award 1 mark for each relevant comment up to a maximum of 2 marks.
(ii) Dry run involves walking-through each step of the algorithm using test data and
updating the value of any variables manually as the processor would. This will
highlight any errors in the logic of the design work.
Award 2 marks for clear description of use made of dry run. Reduce marks for lack of
clarity or detail.
(f) (i) Module testing involves integrating groups of procedures which co-operate with
each other to make sure that there is effective data flow between the procedures.
Component testing involves testing individual procedures or functions to make
sure that they work on their own.
Award 1 mark for correct description of purpose of each. Maximum of 2 marks.
(ii) Trace tables allow the programmer to inspect the value of all variables and
follow the logical execution of the program.
A breakpoint is a flag set in source code that is used in debugging. When code
that is executing reaches a breakpoint, execution is suspended. Breakpoints
allow you to inspect the values of selected variables and trace the code
statements that have already executed.
Award 1 mark for correct description of purpose of each. Maximum of 2 marks.
(g) (i) User-defined modules can be re-used. This reduces development time since
they have already been designed, coded and tested and there is therefore no
need to carry out any further component testing.
Award 2 marks for correct explanation.
(ii) For example:
Specs are kept up-to-date since all members of the development team access
them through the CASE tools.
Encourages and facilitates communication between development team since
most CASE tools have an e-mail facility.
Less effort spent on document administration, such as redrafting diagrams
automated generation of system documentation reducing development time.
Award 1 mark each for any 2 correct benefits. Maximum 2 marks.
3. Print items are added to the tail of the printer queue. When the printer is ready to print,
the item at the head of the print queue is removed and sent to the printer.
added removed
New print Print item Print item 2 Print item 1
Head
Tail
added
Award 2 marks for appropriate diagram. Award 2 marks for clear description of how
queue would be used in this instance. Deduct marks for lack of clarity or detail.
Maximum of 4 marks.
(c) Binary search would require 2/3 comparisons whereas linear search would require 4
comparisons
Award 3 marks, 2 marks for binary search and 1 for linear.
(d) When search item is first item in list – because binary search will start search in the
middle of the list and then focus on the middle of either the top half or the bottom half
of the list.
Award 1 mark for correct situation; award 1 mark for correct explanation. Maximum of
2 marks.
(e) (i) The basic idea in a simple sort is this: The smallest (or largest) element in the
list is identified and put it in its proper place (the first element). Next, the
smallest (or largest) of the remaining N-1 elements is identified, and it is put in
its proper place (the second element). This process is continued until there is
only one element remaining, at which point the list is in sorted order.
Award 2 marks for clear description. Deduct marks for lack of clarity or detail.
(ii) Selection sort algorithm
This is because this algorithm must store the original unsorted list as well as the
sorted list.
Award 1 mark for correct algorithm; award 1 mark for reason. Maximum of 2 marks.
(iii) Bubble sort algorithm
This is because this algorithm takes account of a partially sorted list and
terminates as soon as it realises that no swaps have taken place.
Award 1 mark for explanation.
(c) The certainty attached to the joined premise of is-tall(fred) AND has-good-
coordination(fred) is the minimum of the certainties attached to each, ie min(0.3,0.8)
which is 0.3 (1 mark). The certainty of the conclusions is the total certainty of the
premises multiplied by the certainty factor of the rule (1 mark) ie 0.3*0.5 = 0.15
(1 mark)
Maximum of 3 marks.
7. A number of conflict resolution strategies are typically used to decide which rule to fire.
These include:
• Don’t fire a rule twice on the same data.
• Fire rules on more recent working memory elements before older ones. This allows the
system to follow through a single chain of reasoning, rather than keeping on drawing new
conclusions from old data.
• Fire rules with more specific preconditions before ones with more general preconditions.
This allows us to deal with non-standard cases. If, for example, we have a rule “IF (bird
X) THEN ADD (flies X)’’ and another rule “IF (bird X) AND (penguin X) THEN
ADD (swims X)’’ and a penguin called Tweety, then we would fire the second rule first
and start to draw conclusions from the fact that Tweety swims.
2 marks for each max 4 marks.
<L,[2],[1,3],[]>
<R,[2],[1,3],[]>
<M,[2],[1,3],[]
<L,[2],[3],[1]>
<M,[2],[3],[1]>
<L,[3,1,2],[],[]
<R,[1,2],[3],[]>
<M,[1,2],[3],[]
<R,[1,2],[],[3]>
<L,[1,2],[],[3]>
<M,[2],[1],[3]>
<L,[2],[1],[3]>
<R,[],[1],[2,3]>
<M,[],[1],[2,3]
<R,[],[],[1,2,3]
4 marks for the tree annotated correctly to level 2. All branches should be present but
any left-right sequence is acceptable. 2 marks for the extended (solution) branch.
(iii) • Depth-first and breadth-first methods are generally impractical with large
trees.
1 mark.
3 marks for clear reasoning as follows:
• If breadth-first search does find a solution then it will be an optimal (fewest
operations) solution BUT reaching it is likely to take unreasonable time and
memory since every node to the goal node’s level must be generated and
judged
• Depth-first search may find a solution in reasonable time and memory but
this will be the nearest solution to the left hand side of the tree and it could
be a highly non-optimal solution that requires the robot to perform an
unnecessarily large number of operations.
9. This is a depth first, depth limited search procedure. It is used mainly in game playing
when you are trying to maximise the value of the state evaluation function and the
opponent’s goal is to minimise the value of the evaluation function.
1 mark for description and 2 marks for example.
(e) Hill climbing would cause the process to stop because all of these states have a lower
score than the current state.
1 mark.
12.
14. (a) The anonymous variable _ is used to represent the tail. If the person is the same as the
head of the list then succeed. (1 mark) If not check to see if the person is in the tail of
the list. (1 mark) To do this check the head of the tail and repeat again and again
until we come to the end of the list or succeed (1 mark)
3 marks allocated as indicated.
(b) Yes.
john becomes head of list and david is checked against john - fail
mary becomes head of list and david is checked against mary - fail
david becomes head of list and david is checked against david - succeeds
1 mark for each line of explanation max 3 marks.
16. CISC uses complex instruction sets and addressing modes. RISC processors uses a
minimal instruction set, emphasising the instructions used most often and optimising them
for the fastest possible execution. In RISC, most instructions execute in a single clock
cycle. Software for RISC processors must handle more operations than traditional CISC
processors, but RISC processors have advantages in applications that benefit from faster
instruction execution, such as engineering and graphics workstations and parallel-
processing systems. They are also less costly to design, test, and manufacture. In the mid-
1990s RISC processors began to be used in personal computers instead of the CISC
processors that had been used since the introduction of the microprocessor.
Summary of features:
CISC - complex design, expensive to produce. RISC - simple design, cheap to produce;
micro programmed, hardwired; few instructions,
some instructions need many cycles, instructions execute in a single cycle,
instructions vary in size & format. instructions- same size & fixed format.
2 marks for design differences, 2 marks for performance gains.
17. (a) (i) Addressing mode - enables the operand to be specified in different ways.
1 mark for correct description.
(ii) 232 bytes = 4 Gigabytes (230 = 1 Gbyte, 231 = 2 Gbytes, 232 = 4 Gbytes)
2 marks for correct answer, 1 mark if arithmetic incorrect.
(b) Start address = 1000hex, instruction = 2 bytes (1 for opcode, 1 for operand) so next
located instruction = 1002hex
1 mark for correct answer, 1 mark for explanation
18. (a) DMA hardware controlled by DMAC chip, no need to involve CPU or registers.
Running program not noticeably affected by transfers. Transfer of data faster than
using peripheral interrupts.
1 mark for dedicated hardware, 1 mark for block transfer / CPU bypassed, 1 mark for
explanation of improved performance.
(b) Diagram showing :– DMAC; re-routing of buses; interrupt request from Peripheral to
DMAC & hold request from DMAC to CPU.
1 mark for re-routing, 1 mark for request protocol, 1 mark for details of transfer.
(maximum of 2 marks without a diagram)
(c) Memory interleaving uses multiple banks of memory, which results in increased speed
as the processor is able to access data much faster than possible with a single bank of
memory—
Interleaving means that the processor staggers memory read / writes between two or
more banks of RAM, effectively multiplying the bandwidth of memory. If a processor
requests a read / write at a given memory location, the amount of time required to
complete the operation is limited by the memory’s speed, ie 70 ns RAM will complete
a read /write request in no less than 70 ns. This means that if the processor can handle
data at 30 ns, then it is working at less than half speed for memory transfers.
In the example, the processor takes 30 ns per clock cycle and has to access 70 ns RAM.
Each clock cycle takes about 30 ns. If the processor wants to write to a block of RAM,
it will have to insert 2 wait states between consecutive writes, meaning that for
example it will take 90 ns for each write. However, if each of 2 banks of RAM can be
accessed separately, then instead of inserting 2 wait states and leaving the processor
idle, it will instead access the second bank of memory during the next clock cycle and
insert only one wait state. This has effectively doubled memory throughput.
1 mark for memory interleaving & memory banks, 1 mark for speed incompatibility, 2
marks for explanation of solution, 1 mark for throughput increase. (5 marks)
19. Hard disk – suitable if capacity is greater than 1Gigabyte; possibly not most cost effective
solution; removable units required.
Magnetic tape – very suitable; backup and restoration is sequential.
CD-RW – could be used but more than one disk needed. (1 disk = 650 Megabytes).
Rewritable DVD – suitable if only used with this system; rather expensive.
4 x 1 mark for evaluation of each device.
21. (a) (i) Providing a standard look and feel for applications – can be attributed to the
requirement by users to expect (demand) the same ease-of-use features with
operating environments. In other words, any new version will provide a
familiar environment and increase the ability to secure the system. Adaptive
visualization for GUI, data and computational entities is one of the operating
system’s high level services that enable the users’ interface requirements. The
idea of adaptive visualization is to adapt the level of details in visualization to
the level of user knowledge about these constructs (ideas and structures).
Improving the capability of programs to communicate and pass data – eg
Windows XP changes these problems by turning your computer into an
integrated communications centre. Windows XP includes improved support for
real-time voice and video communications, instant messaging, and even on-line
assistance. All of these tools are integrated into one place on your computer:
Windows Messenger. This tool let’s you talk to, work with, and view your
friends and family, even when you are far apart.
2 x 2 marks for full description of each service.
(ii) The trend stems from large enterprises relying on middleware (software that
“glues together” two existing programs, eg Application and OS) to provide
approximated interoperability. This is the ability of two or more systems
(parts) to exchange information and use the information that has been
exchanged. Development teams often spend too much time coping with
middleware complexity and diversity and as a result of this many middleware
services will migrate into OS layers.
2 marks for full description of trends.
(c) (i) The processor can only fetch and execute instructions from one program/process
at any one time. The scheduler decides which program/process is allocated the
processor
2 marks for explanation.
(ii) Round robin – a scheduling algorithm in which processes are activated in a
fixed cyclic order. Each process is assigned a processor time-slice. Those which
cannot proceed because they are waiting for some event, eg. an I/O operation,
simply return control to the scheduler. If the process is still running at the end
of the time-slice, it is pre-empted and has to wait its turn again. It is a fair
method, suitable to interactive systems. Time-slice about 1/10th of a second.
Multi-level feedback queue – in multi-level queue scheduling, a process is
assigned to a queue and it remains in that queue until access is allowed to the
CPU. However, in multilevel feedback queue scheduling processes are allowed
to move between queues. Usually processes that execute in a short period of
time, eg less than 8 ms, are in the high priority queue and slower processes are
in a lower priority queue.
If a process in a high priority queue does not finish in the allocated time, it is
pre-empted and placed at the end of a lower priority queue.
This system favours short jobs and provides a pre-emptive strategy with many
ready queues at different priority levels.
2 marks for description of each method, 2 marks for comparison.
(b) (i) TCP maps onto the transport layer of the OSI model and ensures that data is
delivered and that packets are delivered in the correct order. IP maps onto the
network layer and is related to the addressing of packets.
1 mark.
(ii) The benefit would come from the low cost and ease of set up that comes from
using a standard protocol. Using TCP/IP also makes it more likely that the
range of equipment in use in schools (ages and operating systems) will be able to
connect to the network and communicate with other networks through the
Internet.
2 marks awarded.
(b) The long distances that can be covered by fibre make it appropriate for the connection
to the local authority as the authorities schools are likely to be spread over a wide
geographical area. The high bandwidth offered is also appropriate given the amount
of traffic likely to be generated by a school.
The UTP cabling is more appropriate in school due to the lower cost (relative to fibre)
and ease of installation. The smaller area to be covered and the possibility of splitting
the school network into smaller units to reduce bandwidth demands within each
section also make UTP a good choice.
1 mark for each, up to 2 marks.
24. (a) CIDR allows a more efficient allocation of IP addresses than Class A, B and C. The
Class system of allocating addresses used a fixed number of bits to identify the
network and the host machine which leads to many unused addresses. CIDR uses a
variable number of bits to identify the network (the prefix). Currently CIDR uses
prefixes of between 13 and 27 bits. (2 marks)
CIDR uses a standard 32 bit address but adds further information to specify how
many bits are used to identify the network. In the above example the addition of “/16”
at the end of the address indicates that 16 bits are used to identify the network – so in
this case 206.13 identifies the network and 01.48 the host. (2 marks)
CIDR also supports hierarchical routing tables so that the number of routing table
entries at each level in the hierarchy can be reduced. (1 mark)
Up to 5 marks as above.
(b) A Class B address uses the first two bytes to identify the host, ie the first 16 bits, so a
CIDR address with a prefix identified as /16 can be considered equivalent to one Class
B address.
2 marks awarded.
25. (a) (i) SMTP: Simple Mail Transfer Protocol is designed to transfer mail between
mail servers or from mail client to mail server. When a voter mails their vote, it
will be sent to a mail server as follows. First of all a connection is opened and
the sender and receiver identify themselves (HELO). Sending then commences
with the sender (MAIL) and recipient (RCPT) being identified. The DATA
command is used to transfer message and the end is indicated with a single
period on a line by itself. Connection is terminated with the QUIT command.
(3 marks)
(c) (i) A public-key encryption scheme, such as that provided by Pretty Good Privacy
(PGP), allows a sender to encrypt a message using a public key published by the
recipient of the message. The recipient can then decrypt this message using his
or her private key.
2 marks.
A digital signature can be attached to a message and used to uniquely identify
the sender (in the same way that a written signature is supposed to authenticate
the identity of the person signing the document). The signature has to be
encrypted to ensure it cannot be forged.
2 marks.
(ii) The voter uses an algorithm to create a large number called a hash code. This
hash code is uniquely tied to the message being sent, if the message changes, the
hash code will no longer match the message. The voter then encrypts the hash
code (and possibly the message) using their private key. The encrypted hash
code is attached to the message and sent to the school. The school then uses the
voter’s public key to decrypt the hash code. The school then uses the same
algorithm to calculate a hash code for the message it received. If the two hash
codes match then the school can be confident that the signed message is from
the voter and has not been tampered with.
4 marks.
There may be some overlap between pupils’ answers to (i) and (ii). The 8 marks can be
distributed across both answers as appropriate, however you should ensure you do not
give marks twice for the same answer.
(d) A virtual private network uses a protocol such as Point to Point Tunnelling Protocol or
Layer 2 Tunnelling Protocol to create a secure link to a private network over a public
(or otherwise insecure) network connection. So a voter could establish a secure,
encrypted, connection with the school intranet by connecting from home over the
Internet. The voter would be authenticated by the school intranet so the school could
be confident that votes cast were from a legitimate voter and could check that each
person only casts one vote.
2 marks for clear explanation.
(b) (i)A plug-in enhances browsers by allowing them to display a greater range of
objects. For example, a multimedia plug-in such as QuickTime allows browsers
to display time based objects such as movies and sound files. They can also be
used to display portable document formats such as Adobe’s portable document
format files. This allows documents to be displayed on screen as they will be
printed, even if the user does not have all the required fonts etc. Java applets
extend the browser even further by enabling platform independent programs to
run on the client machine. The full power of a high level programming
language can therefore be used to provide extremely complex interaction with
the user.
4 marks for clear description.
(ii) The simulated experiment could require the learner to interact with the
experiment, perhaps changing variables and investigating the results of these
changes. The experiment itself could be animated complete with sound to show
the results. This type of complex interaction and animated display could be
provided either by a Java applet or through a plug-in for a Shockwave/Flash
animation
2 marks.
(c) Video telephony can use high end, expensive, dedicated equipment and dedicated lines
for a high quality connection, but this is more likely in the corporate business world.
For the use described it is more likely that the user will require a web cam – a cheap,
Charge Coupled Device (CCD) connected to a video capture card on the computer.
The video and sound data can be transmitted over the Internet. An example of the
software required for this is CUseeMe. Broadband connections allow reasonable
quality and a reasonable price. A standard videoconferencing protocol is H.320 which
deals with compression as well as transmission issues. Another possibility would be
the use of a 3G mobile phone with Multimedia Messaging Services (MMS).
Compression screens generally work by only sending information on the sections of
the video display that have changed.
Up to 8 marks awarded for appropriate description, up to 2 marks for reference to each.