Cambridge International AS & A Level: Information Technology 9626/32 October/November 2022
Cambridge International AS & A Level: Information Technology 9626/32 October/November 2022
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2022 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
2 Six from: 6
Identify patterns in large sets of data
Data patterns help to determine/predict trends in information
Compare and contrast symptoms to analyse disease causes/processes
Determine the effectiveness of treatments/drugs for illnesses to determine
most effective course of treatment/medicines/actions
Repeated analysis (to attempt) to standardise treatment of specific diseases
(Repeated analysis) to speed up diagnosis and treatment of diseases
Determine (normal) patterns of medical claims by
patients/doctors/clinics/hospitals to help reduce costs
Determine abnormal patient outcomes from treatments/procedures
Determine abnormal/unusual patterns of medical claims by
patients/doctors/clinics/hospitals to identify fraudulent claims.
3 Six from: 6
Uses file transfer protocol to transfer data across a network between client
and server
File transfer protocol site/FTP addresses begin with ftp:// to indicate protocol
required for transfer/announce their presence/only respond to requests
using this protocol
Server listens for USER and PASS commands/for username and password
from client
Server uses control connection on port 21
Active mode uses port 21 for data connection with client
Passive mode is used if client is behind firewall/unable to receive incoming
TCP connections
Passive mode sets up different/arbitrary port for client server data
connections
USER/PASS are not encrypted/is clear text unless STPS/FTPS (on port 22)
is used
Server sends acknowledgement to client if credentials accepted and session
is opened
Anonymous access can be used for downloads from server but not uploads
of files
Server allows checkpoint/restart support so downloads can be resumed if
interrupted.
5 Eight from: 8
Strengths:
Document analysis is systematic process of reviewing/evaluating/reading
printed and computer-based/internet-sourced documents
…which provides a large amount of information
Data in documents is examined and analysed to gain meaning/interpreted to
gain understanding/knowledge
...so requires that analyst be literate/have knowledge/be competent in the
topics/system under review
Analyst has to/should combine document research with other forms of
analysis
…so must be proficient in other forms of analysis to reach conclusions that
are reliable so must be highly skilled
Document analysis uses data that has already been collected
….so only data selection is needed so requires less time than other
methods
Document analysis costs only include the method of analysing because the
cost of collection is not needed/ uses data that has already been collected
…so is less costly than other research methods
Many documents are freely available/in pubic domain/already published
….so are accessible to analyst
Document analysis uses unobtrusive/non-invasive/non-interactive research
methods
…so does not affect the subject being researched
Historical documents are stable/not altered by being researched
…so can be examined several times/re-examined by analysts
Documents contain references/exact details that can be cross-refenced to
other sources
…making the research more reliable
Weaknesses:
Documents are produced only as a record of an event
…so may lack insufficient detail to be useful in the research
Data may be inaccurately recorded
…so may not reflect actual events/contain all the data so trends would not
be accurate
Documents may not be in a form that allows data to be electronically
retrievable/searchable
…so research can be prolonged/miss important data
Researcher may be (unintentionally) biased when selecting documents
…so data may be incomplete.
6 Eight from: 8
Data/files/applications is/are centralised on a file/database/applications
server
..so only one copy has to be maintained/updated/backed up
Data/files/applications can be mirrored to other servers for increased
performance
…without the need to copy to each device in use
Disaster recovery is easier/quicker as backups used tor recover data to
server
…rather than to individual user devices
Servers can be updated/upgraded/maintained/relocated
…without affecting the user/need to update individual user devices
System is easily scalable/more servers can be deployed
…without disruption to users/without need to update/upgrade user devices
Data/files can be shared across different computing
platforms/desktops/laptops/OS/mobile devices
Data/files/applications can be accessed from different locations/mobile
devices
Data/files can be queried using SQL/DBMS systems from any corporate
device using same user-interface
…regardless of location/device
Enhanced security of data/data is not stored locally by user but controlled
centrally/setup at time of deployment of client-server system
Servers can be set up to carry out different roles/allow different access
rights for different client devices.
Similarities:
Both develop early prototypes that do not feature the full requirements of the
users/require more work to meet all of user requirements
Developers and end-users interact frequently during both of the processes
of creating prototypes
End users can add features to both types of prototype at the time of review
Both use interactive reviews to improve the prototypes
Differences:
Throw-away prototypes are discarded at any stage whereas evolutionary
prototype become part of the final product
Throw-away prototypes are produced quickly and cheaply whereas
evolutionary prototypes are developed over time
Throw-away prototypes may be non-functional whereas evolutionary
prototypes are functional from inception/the start
Throw-away prototypes have early/more user involvement than evolutionary
prototypes
Progress in throw-away prototyping is easier to monitor/measure than in
evolutionary prototyping
Time scales are easier to set in throw-away prototyping than in evolutionary
prototyping
8 Three from: 3
Source symbols on both Administrator and Student 1 mark
Process symbols (calculate) symbols on both Calculate College Grade
and Calculate Class Grade 1 mark
Differences:
setTimeout() delays the execution of code which runs only once
setInterval() allows/provides for repeated execution of the code at (pre-set)
intervals
clearInterval() can prevent function in setTimeout() from ever being
executed/stop the timeout timer
setInterval() loop only stops when the window is closed/clear Interval() is
invoked/used
setTimeout() minimum value is 0/zero (milliseconds)
setInterval() minimum value is 10 (milliseconds)/if set to less than 10 then
10 is used.