Cambridge International Advanced Subsidiary and Advanced Level
Cambridge International Advanced Subsidiary and Advanced Level
com
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (LEG) 164471
© UCLES 2018 [Turn over
www.dynamicpapers.com
2
1 In a computer system, real numbers are stored using normalised floating-point representation
with:
(a) Find the denary value for the following binary floating-point number.
Mantissa Exponent
1 0 1 1 1 0 0 1 1 0 1 0 0 1 0 1
Working .....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Answer ......................................................................................................................................
[3]
(b) Calculate the normalised floating-point representation of 5.25 in this system. Show your
working.
Working .....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Mantissa Exponent
[3]
(c) The size of the mantissa is decreased and the size of the exponent is increased.
State how this affects the range and precision of the numbers that the computer system can
represent.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
...................................................................................................................................................
...............................................................................................................................................[1]
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
...................................................................................................................................................
...............................................................................................................................................[1]
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
3 Star and bus are two types of topology that can be used in a Local Area Network (LAN).
Bus topology
Star topology
(a) (i) State one benefit and one drawback of the star topology.
Benefit ...............................................................................................................................
...........................................................................................................................................
Drawback ..........................................................................................................................
...........................................................................................................................................
[2]
(ii) State one benefit and one drawback of the bus topology.
Benefit ...............................................................................................................................
...........................................................................................................................................
Drawback ..........................................................................................................................
...........................................................................................................................................
[2]
© UCLES 2018 9608/31/M/J/18
www.dynamicpapers.com
5
(b) The sequence of steps 1 to 7 describes what happens when the LAN transmits data from
Computer X to Computer Y using circuit switching. Four statements (4 to 7) are missing from
the sequence.
3 If busy, Computer X waits and then resends the connection request to Computer Y.
4 ……………
5 ……………
6 ……………
7 ……………
[3]
(c) (i) Protocols are essential for successful transmission of data over a network. The TCP/IP
protocol suite operates on many layers.
State the appropriate layer for each protocol in the following table.
Protocol Layer
TCP
IP
SMTP
[3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[3]
INPUT OUTPUT
A B C X
0 0 0 0
0 0 1 0
0 1 0 1
0 1 1 1
1 0 0 1
1 0 1 1
1 1 0 0
1 1 1 0
(i) Write the Boolean expression for the truth table as a sum-of-products.
X = .................................................................................................................................[2]
(ii) Complete the Karnaugh Map (K-map) for the truth table in part (a)(i).
AB
00 01 11 10
0
C
1
[1]
(iv) Write the simplified sum-of-products expression for your answer to part (a)(iii).
X = .................................................................................................................................[2]
(b) A logic circuit with four inputs produces the following truth table.
INPUT OUTPUT
A B C D X
0 0 0 0 0
0 0 0 1 0
0 0 1 0 0
0 0 1 1 0
0 1 0 0 1
0 1 0 1 1
0 1 1 0 1
0 1 1 1 1
1 0 0 0 0
1 0 0 1 0
1 0 1 0 0
1 0 1 1 0
1 1 0 0 1
1 1 0 1 1
1 1 1 0 0
1 1 1 1 0
AB
CD
[4]
(iii) Write the simplified sum-of-products expression for your answer to part (b)(ii).
X = .................................................................................................................................[2]
• an assignment statement
• a variable
• a signed integer
• a letter
• a digit
• an operator
assignment statement
variable = variable operator signed integer
variable
letter letter
signed integer
+ digit
letter x
digit operator
1 ˄
2 \
(i) xy = xy ^ c4
Reason ..............................................................................................................................
.......................................................................................................................................[1]
(ii) zy = zy \ 10
Reason ..............................................................................................................................
.......................................................................................................................................[1]
(iii) yy := xz ^ − 6
Reason ..............................................................................................................................
.......................................................................................................................................[1]
(b) Complete the Backus-Naur Form (BNF) for the syntax diagrams on the opposite page.
...................................................................................................................................................
<variable> ::=
...................................................................................................................................................
...................................................................................................................................................
<operator> ::=
...................................................................................................................................................
[4]
(c) Rewrite the BNF rule for a variable so that it can be any number of letters.
<variable> ::=
...............................................................................................................................................[2]
(a) The company is concerned that malware might disrupt their business.
Description Term
Redirection to a bogus website that appears to be
A
legitimate to gain confidential data. .................................
.........................................................................................
C ......................................................................................... Spyware
.........................................................................................
.........................................................................................
D ......................................................................................... Worm
.........................................................................................
[4]
(ii) A member of staff is using the Internet to carry out research. They are worried about the
threat from terms A and B.
Term A ...............................................................................................................................
...........................................................................................................................................
Term B ...............................................................................................................................
...........................................................................................................................................
[2]
(b) A customer downloads a new educational software package from the company.
Explain how the customer’s and the company’s computers use a hashing algorithm to assure
the customer that:
• the software has come from the company (is authentic) and
• no one has altered it.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
The museum is not sure about the actual temperatures. The museum installs some equipment.
This records the temperatures every hour and ensures the temperature stays within a set range.
...............................................................................................................................................[1]
Identify two other items of hardware that the museum can use for the type of system identified.
Item 1 ........................................................................................................................................
Purpose ....................................................................................................................................
...................................................................................................................................................
Item 2 ........................................................................................................................................
Purpose ....................................................................................................................................
...................................................................................................................................................
[4]
(c) The equipment records the temperature in all seven rooms in the museum.
Each recording is stored as two successive bytes in memory. The format is as shown.
Temperature Room
7 6 5 4 3 2 1 0
Byte 1 Byte 2
The room is indicated by the setting of one of the bits in Byte 2 to 1. For example, room 7 is
indicated by setting bit 7 to 1.
Temperature Room
7 6 5 4 3 2 1 0
1 0 1 1 0 0 1 1 0 0 1 0 0 0 0 1
Byte 1 Byte 2
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[3]
(ii) The system receives a temperature reading of 238 from room number 4.
Complete the bytes to show the two bytes for this recording. The reading has not yet
been processed.
7 6 5 4 3 2 1 0
Byte 1 Byte 2
[2]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.