0% found this document useful (0 votes)
12 views16 pages

Cambridge International Advanced Subsidiary and Advanced Level

Past papers

Uploaded by

Hiba Hassan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views16 pages

Cambridge International Advanced Subsidiary and Advanced Level

Past papers

Uploaded by

Hiba Hassan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

www.dynamicpapers.

com

Cambridge International Examinations


Cambridge International Advanced Subsidiary and Advanced Level
* 5 6 0 9 3 6 5 8 8 5 *

COMPUTER SCIENCE 9608/31


Paper 3 Advanced Theory May/June 2018
1 hour 30 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 15 printed pages and 1 blank page.

DC (LEG) 164471
© UCLES 2018 [Turn over
www.dynamicpapers.com
2

1 In a computer system, real numbers are stored using normalised floating-point representation
with:

• 12 bits for the mantissa


• 4 bits for the exponent
• Two’s complement form for both mantissa and exponent.

(a) Find the denary value for the following binary floating-point number.

Mantissa Exponent

1 0 1 1 1 0 0 1 1 0 1 0 0 1 0 1

Show your working.

Working .....................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Answer ......................................................................................................................................
[3]

(b) Calculate the normalised floating-point representation of 5.25 in this system. Show your
working.

Working .....................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Mantissa Exponent

[3]

© UCLES 2018 9608/31/M/J/18


www.dynamicpapers.com
3

(c) The size of the mantissa is decreased and the size of the exponent is increased.

State how this affects the range and precision of the numbers that the computer system can
represent.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

2 A programmer uses non-composite and composite data types to create a program.

(a) Define the term non-composite data type.

...................................................................................................................................................

...............................................................................................................................................[1]

(b) Describe two different non-composite data types.

Data type 1 ...............................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Data type 2 ...............................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

(c) Define the term composite data type.

...................................................................................................................................................

...............................................................................................................................................[1]

© UCLES 2018 9608/31/M/J/18 [Turn over


www.dynamicpapers.com
4

(d) Describe two different composite data types.

Data type 1 ...............................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Data type 2 ...............................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

3 Star and bus are two types of topology that can be used in a Local Area Network (LAN).

Bus topology

Star topology

(a) (i) State one benefit and one drawback of the star topology.

Benefit ...............................................................................................................................

...........................................................................................................................................

Drawback ..........................................................................................................................

...........................................................................................................................................
[2]

(ii) State one benefit and one drawback of the bus topology.

Benefit ...............................................................................................................................

...........................................................................................................................................

Drawback ..........................................................................................................................

...........................................................................................................................................
[2]
© UCLES 2018 9608/31/M/J/18
www.dynamicpapers.com
5

(b) The sequence of steps 1 to 7 describes what happens when the LAN transmits data from
Computer X to Computer Y using circuit switching. Four statements (4 to 7) are missing from
the sequence.

A Computer X sends the data.


B The sender signals node to deallocate resources.
C Computer Y sends a receipt signal.
D If available, Computer X sets up path between nodes.

Write one letter (A to D) in the appropriate space to complete the sequence.

1 Computer X sends a connection request to Computer Y.

2 Computer Y sends ready or busy signal.

3 If busy, Computer X waits and then resends the connection request to Computer Y.

4 ……………

5 ……………

6 ……………

7 ……………
[3]

(c) (i) Protocols are essential for successful transmission of data over a network. The TCP/IP
protocol suite operates on many layers.

State the appropriate layer for each protocol in the following table.

Protocol Layer

TCP

IP

SMTP

[3]

© UCLES 2018 9608/31/M/J/18 [Turn over


www.dynamicpapers.com
6

(ii) Peer-to-peer (P2P) file sharing uses the BitTorrent protocol.

Explain how the BitTorrent protocol allows files to be shared.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[3]

© UCLES 2018 9608/31/M/J/18


www.dynamicpapers.com
7

Question 4 begins on the next page.

© UCLES 2018 9608/31/M/J/18 [Turn over


www.dynamicpapers.com
8

4 (a) A Boolean expression produces the following truth table.

INPUT OUTPUT
A B C X
0 0 0 0
0 0 1 0
0 1 0 1
0 1 1 1
1 0 0 1
1 0 1 1
1 1 0 0
1 1 1 0

(i) Write the Boolean expression for the truth table as a sum-of-products.

X = .................................................................................................................................[2]

(ii) Complete the Karnaugh Map (K-map) for the truth table in part (a)(i).

AB

00 01 11 10

0
C
1

[1]

The K-map can be used to simplify the function in part (a)(i).

(iii) Draw loop(s) around appropriate group(s) of 1s to produce an optimal sum-of-products


for the table in part (a)(ii). [2]

(iv) Write the simplified sum-of-products expression for your answer to part (a)(iii).

X = .................................................................................................................................[2]

© UCLES 2018 9608/31/M/J/18


www.dynamicpapers.com
9

(b) A logic circuit with four inputs produces the following truth table.

INPUT OUTPUT
A B C D X
0 0 0 0 0
0 0 0 1 0
0 0 1 0 0
0 0 1 1 0
0 1 0 0 1
0 1 0 1 1
0 1 1 0 1
0 1 1 1 1
1 0 0 0 0
1 0 0 1 0
1 0 1 0 0
1 0 1 1 0
1 1 0 0 1
1 1 0 1 1
1 1 1 0 0
1 1 1 1 0

(i) Complete the K-map that corresponds to the truth table.

AB

CD

[4]

(ii) Draw loop(s) around appropriate group(s) of 1s to produce an optimal sum-of-products


for the table in part (b)(i). [2]

(iii) Write the simplified sum-of-products expression for your answer to part (b)(ii).

X = .................................................................................................................................[2]

© UCLES 2018 9608/31/M/J/18 [Turn over


www.dynamicpapers.com
10

5 The following syntax diagrams show the syntax of:

• an assignment statement
• a variable
• a signed integer
• a letter
• a digit
• an operator

assignment statement
variable = variable operator signed integer

variable
letter letter

signed integer
+ digit

letter x

digit operator
1 ˄

2 \

© UCLES 2018 9608/31/M/J/18


www.dynamicpapers.com
11

(a) The following assignment statements are invalid.

Give the reason in each case.

(i) xy = xy ^ c4

Reason ..............................................................................................................................

.......................................................................................................................................[1]

(ii) zy = zy \ 10

Reason ..............................................................................................................................

.......................................................................................................................................[1]

(iii) yy := xz ^ − 6

Reason ..............................................................................................................................

.......................................................................................................................................[1]

(b) Complete the Backus-Naur Form (BNF) for the syntax diagrams on the opposite page.

<assignment statement> ::=

...................................................................................................................................................

<variable> ::=

...................................................................................................................................................

<signed integer> ::=

...................................................................................................................................................

<operator> ::=

...................................................................................................................................................
[4]

(c) Rewrite the BNF rule for a variable so that it can be any number of letters.

<variable> ::=

...............................................................................................................................................[2]

© UCLES 2018 9608/31/M/J/18 [Turn over


www.dynamicpapers.com
12

6 A company specialises in educational software.

(a) The company is concerned that malware might disrupt their business.

(i) Add appropriate descriptions and terms in the table.

Description Term
Redirection to a bogus website that appears to be
A
legitimate to gain confidential data. .................................

B Use email to attempt to gain a user’s confidential data.


.................................

.........................................................................................
C ......................................................................................... Spyware

.........................................................................................

.........................................................................................
D ......................................................................................... Worm

.........................................................................................

[4]

(ii) A member of staff is using the Internet to carry out research. They are worried about the
threat from terms A and B.

Identify one solution to the each of the threats.

Term A ...............................................................................................................................

...........................................................................................................................................

Term B ...............................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2018 9608/31/M/J/18


www.dynamicpapers.com
13

(b) A customer downloads a new educational software package from the company.

Explain how the customer’s and the company’s computers use a hashing algorithm to assure
the customer that:

• the software has come from the company (is authentic) and
• no one has altered it.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2018 9608/31/M/J/18 [Turn over


www.dynamicpapers.com
14

7 A museum stores antique items that need to be kept at constant temperature.

The museum is not sure about the actual temperatures. The museum installs some equipment.
This records the temperatures every hour and ensures the temperature stays within a set range.

(a) Identify the type of system described.

...............................................................................................................................................[1]

(b) The system has a temperature sensor.

Identify two other items of hardware that the museum can use for the type of system identified.

Describe the purpose of each item.

Item 1 ........................................................................................................................................

Purpose ....................................................................................................................................

...................................................................................................................................................

Item 2 ........................................................................................................................................

Purpose ....................................................................................................................................

...................................................................................................................................................
[4]

(c) The equipment records the temperature in all seven rooms in the museum.

Each recording is stored as two successive bytes in memory. The format is as shown.

Temperature Room

7 6 5 4 3 2 1 0

Byte 1 Byte 2

The room is indicated by the setting of one of the bits in Byte 2 to 1. For example, room 7 is
indicated by setting bit 7 to 1.

Bit 0 of Byte 2 is a flag:

• The flag’s initial value is zero.


• When the reading has been processed, the flag’s value is set to 1.

Byte 1 contains the temperature reading as an unsigned integer.

© UCLES 2018 9608/31/M/J/18


www.dynamicpapers.com
15

One reading returns the following binary data.

Temperature Room

7 6 5 4 3 2 1 0
1 0 1 1 0 0 1 1 0 0 1 0 0 0 0 1

Byte 1 Byte 2

(i) Analyse the data contained in the two bytes.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[3]

(ii) The system receives a temperature reading of 238 from room number 4.

Complete the bytes to show the two bytes for this recording. The reading has not yet
been processed.

7 6 5 4 3 2 1 0

Byte 1 Byte 2
[2]

© UCLES 2018 9608/31/M/J/18


www.dynamicpapers.com
16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2018 9608/31/M/J/18

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy