Cambridge International AS & A Level: Computer Science 9608/12 October/November 2021
Cambridge International AS & A Level: Computer Science 9608/12 October/November 2021
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2021 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
It is volatile
2(a)(i) 2 bits 1
Working:
• Pixels is 8 * 8
• Bytes = (2 * 8 * 8) / 8 // (2 * 64) / 8
Answer: 16 (bytes)
• A metafile / wrapper
• …that contains audio and video // …that contains various different types
of data
• Describes how the (encoded) data is stored
• Is not confined to any one codec / compression method
• Synchronises the different types of data (on playback)
3(c) 1 mark for name and max 2 marks for matching description 3
Parity check
• Counts if the number of 1s or 0s in each byte is odd or even
• Adds a bit to make the number odd or even
• Parity is re-calculated at receiving end and a change in parity indicates
corruption
Echo check
• Receiver sends data back to sender
• Sender compares data received with original
• Sender either confirms or resends data
3(d) 1 mark per bullet point to max 2 per security measure, max 4 in total 4
e.g.
• Firewall
• …denies access to data that does not conform to set rules
• ... maintains a blacklist/whitelist of IP addresses
• Proxy
• …denies access to data that does not conform to set rules
• … prevents some requests ever reaching the server
• Authentication
• ... makes use of usernames and strong passwords...
• ... without a correct unique combination of characters data on the server
cannot be accessed
• ... makes use of biometrics ...
• ... unique features of individuals that cannot be guessed
• ... makes use of two step verification ...
• ... a verification code is sent to a mobile phone or other device
• Compare instructions
• Arithmetic operations
• Data movement
4(b) 1 mark per bullet point to max 2 per register, max 6 in total 6
Program Counter
• Points to the address ...
• ... of the next instruction to be fetched
• So the address can be transferred to/from the MAR
A DLL file can be edited without having to recompile the calling program.
One drawback of a DLL file is that the main program could stop working if the
DLL file is corrupted.
5(b) 1 mark for name, 1 mark per bullet point to max 3 for description 4
Interpreter
• Converts high level language code into low level code
• Translates and runs one line at a time
• Stops when an error occurs
• Allows errors to be corrected in real time // errors can be corrected and
translation continued from that point
Compiler
• Converts high level language code into low level code
• Translates the whole program before attempting to run it
• Creates an executable file/object code...
• ... if there are no errors
• Generates a report of all the errors
6 1 mark per bullet point to max 2 per utility program, max 4 in total 4
File compression
• Reduces the file size
• ... by using algorithms to change the data
• ... which can be either lossy or lossless
Defragmenter
• Finds files that are split across the disk
• …and moves the blocks that make up each file to be contiguous
• Collates free space
A B C Working space X
0 0 0 1
0 0 1 1
0 1 0 1
0 1 1 1
1 0 0 1
1 0 1 1
1 1 0 0
1 1 1 0
8(c) 1 mark for the shaded rows and 1 mark for the unshaded rows 2
ALTER TABLE
SELECT FROM
INNER JOIN
CREATE DATABASE
8(d) 1 mark per bullet point to max 2 per validation method, max 4 in total 4
• Presence check
• …to make sure the phone number is entered // to make sure the field is
not left empty
• Length check
• …to make sure there are a maximum of 14 characters
256
Smallest: −128
Largest: +127