SlideShare una empresa de Scribd logo
1 de 6
Descargar para leer sin conexión
UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS
GCE Advanced Level




MARK SCHEME for the May/June 2009 question paper
for the guidance of teachers



                                9691 COMPUTING
        9691/03              Paper 3 (Written Paper 3), maximum raw mark 90



This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.

Mark schemes must be read in conjunction with the question papers and the report on the
examination.



•   CIE will not enter into discussions or correspondence in connection with these mark schemes.



CIE is publishing the mark schemes for the May/June 2009 question papers for most IGCSE, GCE
Advanced Level and Advanced Subsidiary Level syllabuses and some Ordinary Level syllabuses.




                            www.xtremepapers.net
Page 2                 Mark Scheme: Teachers’ version                 Syllabus       Paper
                           GCE A LEVEL – May/June 2009                     9691           03

1   -File/Storage
         -Save to another folder/create folders for different types of message.
    -Replying
         -Can send a reply with address automatically put in
    -Copying/Forwarding/multiple forwarding
         -Make a copy of the message forward it to another/many person
         (using their address/book)/No need to retype the message
    -(Automatic) deletion
         -Remove message from box (after reading it to free up space)/to make space
    -Blocking
         -If message is unsolicited or unwelcome then arrange for provider to block future messages
         from that address.
    -Mark as Read/Unread
         -To ensure message remains in box/for future reference
    -Mark as important/high priority
         -To ensure message does not get ignored.
    -Sorting/Grouping
         -According to time received/sender/subject/…
    (Up to 2 per type, max 4 types, max 8)                                                       [8]


2   (a)   (i) -Data and methods are kept together/Data can only be accessed using the methods
              attached to it.                                                              [1]

          (ii) -Computer told facts and rules and then manipulates them to provide answers to
               queries.                                                                    [1]


    (b)   (i) -Also known as top-down design
              -Split original problem into smaller parts
              -Continue splitting into smaller and smaller parts until…
              -Each part can be considered to be a single process.
              (1 per -, max 2)                                                                   [2]

          (ii) -A procedure/small section of code…
               -which returns a specific value
               -The value is returned whenever the function name appears/acting just like a variable
               name.
               (1 per -, max 2)                                                                  [2]


    (c) Repeat
        Compare new value with root value
        -If > root value then follow right subtree
        -Else follow left subtree
        -Until no subtree
        -Insert new value as root of new subtree.
        (1 per -, max 4) (Allow symmetric algorithm)                                             [4]




                                             © UCLES 2009


                               www.xtremepapers.net
Page 3                    Mark Scheme: Teachers’ version                Syllabus   Paper
                              GCE A LEVEL – May/June 2009                    9691       03

    (d)   (i) -Used to combine already compiled procedures
              -with compiled program…
              -to create an executable file.
              -Deals with external references.

          (ii) -Copies object code into…
               -(primary) memory ready for execution.
               -Deals with addressing anomalies,
               -particularly relocatable addressing
               (1 per -, max 2 per dotty, max 4)                                               [4]


3   (a) -Goods offered for sale on electronic communication medium/Internet
        -Buyer orders goods by providing personal information on Internet..
        -including bank account/credit card/other payment details.
        -data transfer must be secure
        -that firm offering goods is genuine
        -that buyer is genuine
        -Goods dispatched to purchaser after payment checked.
        (1 per -, max 3)                                                                       [3]


    (b) -Enlarges market…
        -now worldwide rather than just local base.
        -Opens up richer markets where higher prices can be charged.
        -Sells 24/7
        -No need for expensive overheads
        -No need to employ large number of sales staff
        (1 per -, max 4)                                                                       [4]


4   (a)
                  CUSTOMER                         ACCOUNT                                     [1]


    (b)   (i) Many to many.                                                                    [1]

          (ii)
                       ACCOUNT                   LINK               STOCK


                 Marks:
                 -Use of Link table with sensible and descriptive name
                 -ACCOUNT to LINK is One to Many
                 -LINK to STOCK is Many to ONE.
                 (1 per -, max 2)                                                              [2]




                                               © UCLES 2009


                                  www.xtremepapers.net
Page 4                     Mark Scheme: Teachers’ version                  Syllabus          Paper
                               GCE A LEVEL – May/June 2009                      9691              03

    (c)    (i) -A unique identifier for a record
               -e.g. Customer ID.                                                                        [2]

          (ii) A field/item, not the primary key, offering an alternative identification for the record (not
               necessarily unique.)
               -e.g. Postal area (to arrange delivery schedules).                                        [2]

          (iii) -A field/item in one table which is a primary key in another table/acts as a link between
                tables.
                -Account number in customer table links records to relevant account in account table. [2]


    (d) -Confidential/Personal data of a sensitive type.
        -Will have guaranteed privacy of data to customers.
        -Must comply with legislation protecting data.
        -Do not want to lose any data or have data maliciously altered/used
        Important to maintain data integrity.
        -Passwords to get onto system…
        -and into different tables…
        -in hierarchical fashion…
        -giving different access rights/RO or RW…
        -and providing different views of the data
        -Physical protection by (e.g.) locking system terminals away/iris recognition/fingerprints/….
        -Protecting system with firewalls etc.
        (1 per -, max 6)                                                                              [6]


5   (a) -Concept of a stored program
        -Instructions and data use the same (primary) memory
        -Use of a single processor
        -Follows a sequential set of instructions.
        (1 per -, max 3)                                                                                 [3]


    (b)    (i) -201/202 (Sensible value)
               -because, once sent to MAR the value in the PC is incremented                             [2]

          (ii) -The result of a jump instruction which…
               -requires that the next instruction is not to be handled in sequence/specifically, that held
               in 180.                                                                                  [2]


6   (a)    (i) 11011010

          (ii) 10100110
               (1 per dotty)                                                                             [2]


    (b)    (i) -The fractional part of the representation
               -Place value of MSB is –1…
               -remainder of bits are ½, ¼…
               -Holds the magnitude of the data.
               (1 per -, max 2)                                                                          [2]




                                               © UCLES 2009


                                 www.xtremepapers.net
Page 5                 Mark Scheme: Teachers’ version                    Syllabus     Paper
                           GCE A LEVEL – May/June 2009                        9691         03

        (ii) -Is a two’s complement integer which…
             -holds the power of 2…
             -by which the mantissa must be multiplied...
             -to give the original value.
             (1 per -, max 2)                                                                      [2]

        (iii) 0.0101011 * 10 ^ 0101
              = 1010.11
              =8+2+½+¼
              Alternative:
              10 = 1010 and .75 = .11
              10.75 = 00101011 x 10^101

                   Point moves 5 places
             (1 per line, max 3)                                                                   [3]

        (iv) 01010110       0100
             (1 for mantissa, 1 for exponent)                                                      [2]


7   (a) -A series of bars representing time to be taken on…
        -the different tasks which are needed to produce the system…
        -and relative timings of tasks.
        -Shows when different resources are going to be required/when they should be booked.
        -Also shows reliance of one task on the completion of another.
        -Will show how long the whole system should take to complete.
        (1 per -, max 4)                                                                           [4]


    (b) -A series of manuals to explain the software…
        -in printed form and/or on screen.
        -Overview of package/contents page/index/glossary/…
        -Sample inputs/outputs.
        -Explanation of error messages.
        -Installation of software/hardware.
        -Quick reference guide.
        -How to carry out simple maintenance (like reloading a till roll).
        (1 per -, max 6)                                                                           [6]


8   (a) -Cheaper than waiting until real thing is built
        -May be impossible to alter things after building
        -Safer than testing in real life, e.g. evacuation procedures, using real people.
        -Impossible to carry out some tests, e.g. burning building down, when building complete.
        (1 per -, max 3)                                                                           [3]




                                             © UCLES 2009


                               www.xtremepapers.net
Page 6                 Mark Scheme: Teachers’ version                    Syllabus         Paper
                           GCE A LEVEL – May/June 2009                        9691             03

    (b)   (i) -Width of aisles..
                  -to be able to assess the number of people who can use the aisle at once.
              -Number of people in store…
                  -evacuation times will depend on number of people.
              -Position of exits…
                  -relative to groupings of people.
              -Number of exits…
                  -should be kept as low as is safe, for security reasons.
              -Position of fire/spread of fire…
                  -different positions will dictate flow of people/speed of spread.
              -Positions of different areas in store (e.g. bakery)…
                  -some areas will attract crowds of shoppers.
              -Time taken for emergency services to arrive
                  -expert help will alleviate the situation
              (1 per -, max 3 variables, max 6)                                                       [6]

          (ii) -Large quantities of data …
               -all interrelating with each other…
               -because some outcomes rely on outcomes of others.
               -Large quantities of processing required
               (1 per -, max 2)                                                                       [2]


9   -Interrupt given a priority
    -Placed in queue with other interrupts to be done…
    -according to priority.
    -When it becomes the highest priority interrupt it is dealt with
    -Contents of special registers are placed on a stack/saved
    -Interrupt (and others) dealt with
    -values read from stack into special registers.
    -Check for interrupt(s) at end of each cycle before fetching next instruction
    -Vectored interrupts
    (1 per -, max 6)                                                                                  [6]




                                             © UCLES 2009


                              www.xtremepapers.net

Más contenido relacionado

La actualidad más candente

Nov 08 MS3
Nov 08 MS3Nov 08 MS3
Nov 08 MS3
Samimvez
 
Nov 07 MS3
Nov 07 MS3Nov 07 MS3
Nov 07 MS3
Samimvez
 
Nov 06 MS3
Nov 06 MS3Nov 06 MS3
Nov 06 MS3
Samimvez
 
June 06 MS1
June 06 MS1June 06 MS1
June 06 MS1
Samimvez
 
Nov 09 P11
Nov 09 P11Nov 09 P11
Nov 09 P11
Samimvez
 
June 10 MS13
June 10 MS13June 10 MS13
June 10 MS13
Samimvez
 
June 10 MS32
June 10 MS32June 10 MS32
June 10 MS32
Samimvez
 
June 08 P1
June 08 P1June 08 P1
June 08 P1
Samimvez
 
June 10 MS33
June 10 MS33June 10 MS33
June 10 MS33
Samimvez
 
June 07 P1
June 07 P1June 07 P1
June 07 P1
Samimvez
 

La actualidad más candente (11)

Nov 03 MS
Nov 03 MSNov 03 MS
Nov 03 MS
 
Nov 08 MS3
Nov 08 MS3Nov 08 MS3
Nov 08 MS3
 
Nov 07 MS3
Nov 07 MS3Nov 07 MS3
Nov 07 MS3
 
Nov 06 MS3
Nov 06 MS3Nov 06 MS3
Nov 06 MS3
 
June 06 MS1
June 06 MS1June 06 MS1
June 06 MS1
 
Nov 09 P11
Nov 09 P11Nov 09 P11
Nov 09 P11
 
June 10 MS13
June 10 MS13June 10 MS13
June 10 MS13
 
June 10 MS32
June 10 MS32June 10 MS32
June 10 MS32
 
June 08 P1
June 08 P1June 08 P1
June 08 P1
 
June 10 MS33
June 10 MS33June 10 MS33
June 10 MS33
 
June 07 P1
June 07 P1June 07 P1
June 07 P1
 

Destacado

Destacado (12)

June 03 P2
June 03 P2June 03 P2
June 03 P2
 
Research into media Institutions
Research into media InstitutionsResearch into media Institutions
Research into media Institutions
 
Kittens
KittensKittens
Kittens
 
Visual influences
Visual influencesVisual influences
Visual influences
 
Nov 05 P3
Nov 05 P3Nov 05 P3
Nov 05 P3
 
Cam's Totem Pole
Cam's Totem PoleCam's Totem Pole
Cam's Totem Pole
 
Premipera la convivència def
Premipera la convivència defPremipera la convivència def
Premipera la convivència def
 
Location recce
Location recceLocation recce
Location recce
 
Example3
Example3Example3
Example3
 
Coms1010 exam paper - may 08
Coms1010   exam paper - may 08Coms1010   exam paper - may 08
Coms1010 exam paper - may 08
 
Coms1010 exam paper - nov10
Coms1010   exam paper - nov10Coms1010   exam paper - nov10
Coms1010 exam paper - nov10
 
Media Evaluation
Media EvaluationMedia Evaluation
Media Evaluation
 

Similar a June 09 MS3

Nov 09 MS12
Nov 09 MS12Nov 09 MS12
Nov 09 MS12
Samimvez
 
Nov 09 MS11
Nov 09 MS11Nov 09 MS11
Nov 09 MS11
Samimvez
 
June 07 MS1
June 07 MS1June 07 MS1
June 07 MS1
Samimvez
 
June 07 MS3
June 07 MS3June 07 MS3
June 07 MS3
Samimvez
 
June 09 MS1
June 09 MS1June 09 MS1
June 09 MS1
Samimvez
 
June 08 MS3
June 08 MS3June 08 MS3
June 08 MS3
Samimvez
 
June 05 MS3
June 05 MS3June 05 MS3
June 05 MS3
Samimvez
 
Nov 08 MS1
Nov 08 MS1Nov 08 MS1
Nov 08 MS1
Samimvez
 
Nov 07 MS1
Nov 07 MS1Nov 07 MS1
Nov 07 MS1
Samimvez
 
June 08 MS1
June 08 MS1June 08 MS1
June 08 MS1
Samimvez
 
Nov 06 MS1
Nov 06 MS1Nov 06 MS1
Nov 06 MS1
Samimvez
 
June 04 MS
June 04 MSJune 04 MS
June 04 MS
Samimvez
 
Nov 04 MS1
Nov 04 MS1Nov 04 MS1
Nov 04 MS1
Samimvez
 
Nov 04 MS3
Nov 04 MS3Nov 04 MS3
Nov 04 MS3
Samimvez
 
June 03 MS1
June 03 MS1June 03 MS1
June 03 MS1
Samimvez
 

Similar a June 09 MS3 (20)

Nov 09 MS12
Nov 09 MS12Nov 09 MS12
Nov 09 MS12
 
Nov 09 MS11
Nov 09 MS11Nov 09 MS11
Nov 09 MS11
 
June 07 MS1
June 07 MS1June 07 MS1
June 07 MS1
 
June 07 MS3
June 07 MS3June 07 MS3
June 07 MS3
 
June 09 MS1
June 09 MS1June 09 MS1
June 09 MS1
 
June 08 MS3
June 08 MS3June 08 MS3
June 08 MS3
 
June 05 MS3
June 05 MS3June 05 MS3
June 05 MS3
 
Nov 08 MS1
Nov 08 MS1Nov 08 MS1
Nov 08 MS1
 
Nov 07 MS1
Nov 07 MS1Nov 07 MS1
Nov 07 MS1
 
Computing 9691 Mark Scheme for May / June 2007 Cambridge
Computing 9691 Mark Scheme for May / June 2007 CambridgeComputing 9691 Mark Scheme for May / June 2007 Cambridge
Computing 9691 Mark Scheme for May / June 2007 Cambridge
 
Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 1
Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 1Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 1
Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 1
 
Mark Scheme for May June 2008 Question Paper Computing 9691 Computers Zimbabwe
Mark Scheme for May June 2008 Question Paper Computing 9691 Computers ZimbabweMark Scheme for May June 2008 Question Paper Computing 9691 Computers Zimbabwe
Mark Scheme for May June 2008 Question Paper Computing 9691 Computers Zimbabwe
 
June 08 MS1
June 08 MS1June 08 MS1
June 08 MS1
 
Nov 06 MS1
Nov 06 MS1Nov 06 MS1
Nov 06 MS1
 
Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 3
Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 3Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 3
Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 3
 
June 04 MS
June 04 MSJune 04 MS
June 04 MS
 
Nov 04 MS1
Nov 04 MS1Nov 04 MS1
Nov 04 MS1
 
Nov 04 MS3
Nov 04 MS3Nov 04 MS3
Nov 04 MS3
 
June 03 MS1
June 03 MS1June 03 MS1
June 03 MS1
 
Computing 9691 Test Paper Question Paper Paper 3 (Written paper 3) for May / ...
Computing 9691 Test Paper Question Paper Paper 3 (Written paper 3) for May / ...Computing 9691 Test Paper Question Paper Paper 3 (Written paper 3) for May / ...
Computing 9691 Test Paper Question Paper Paper 3 (Written paper 3) for May / ...
 

Más de Samimvez (20)

Sql installation tutorial
Sql installation tutorialSql installation tutorial
Sql installation tutorial
 
Example2
Example2Example2
Example2
 
Labsheet 3
Labsheet 3Labsheet 3
Labsheet 3
 
Labsheet 3,5
Labsheet 3,5Labsheet 3,5
Labsheet 3,5
 
EQ V3x
EQ V3xEQ V3x
EQ V3x
 
Eq v2
Eq v2Eq v2
Eq v2
 
3.6
3.63.6
3.6
 
3.2
3.23.2
3.2
 
3.10
3.103.10
3.10
 
3.1
3.13.1
3.1
 
3.3
3.33.3
3.3
 
3.8
3.83.8
3.8
 
3.4
3.43.4
3.4
 
3.7
3.73.7
3.7
 
3.5
3.53.5
3.5
 
3.9
3.93.9
3.9
 
June 02 MS2
June 02 MS2June 02 MS2
June 02 MS2
 
June 05 MS2
June 05 MS2June 05 MS2
June 05 MS2
 
June 09 P1
June 09 P1June 09 P1
June 09 P1
 
Nov 05 P2
Nov 05 P2Nov 05 P2
Nov 05 P2
 

Último

Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
UK Journal
 

Último (20)

How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 

June 09 MS3

  • 1. UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS GCE Advanced Level MARK SCHEME for the May/June 2009 question paper for the guidance of teachers 9691 COMPUTING 9691/03 Paper 3 (Written Paper 3), maximum raw mark 90 This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the details of the discussions that took place at an Examiners’ meeting before marking began, which would have considered the acceptability of alternative answers. Mark schemes must be read in conjunction with the question papers and the report on the examination. • CIE will not enter into discussions or correspondence in connection with these mark schemes. CIE is publishing the mark schemes for the May/June 2009 question papers for most IGCSE, GCE Advanced Level and Advanced Subsidiary Level syllabuses and some Ordinary Level syllabuses. www.xtremepapers.net
  • 2. Page 2 Mark Scheme: Teachers’ version Syllabus Paper GCE A LEVEL – May/June 2009 9691 03 1 -File/Storage -Save to another folder/create folders for different types of message. -Replying -Can send a reply with address automatically put in -Copying/Forwarding/multiple forwarding -Make a copy of the message forward it to another/many person (using their address/book)/No need to retype the message -(Automatic) deletion -Remove message from box (after reading it to free up space)/to make space -Blocking -If message is unsolicited or unwelcome then arrange for provider to block future messages from that address. -Mark as Read/Unread -To ensure message remains in box/for future reference -Mark as important/high priority -To ensure message does not get ignored. -Sorting/Grouping -According to time received/sender/subject/… (Up to 2 per type, max 4 types, max 8) [8] 2 (a) (i) -Data and methods are kept together/Data can only be accessed using the methods attached to it. [1] (ii) -Computer told facts and rules and then manipulates them to provide answers to queries. [1] (b) (i) -Also known as top-down design -Split original problem into smaller parts -Continue splitting into smaller and smaller parts until… -Each part can be considered to be a single process. (1 per -, max 2) [2] (ii) -A procedure/small section of code… -which returns a specific value -The value is returned whenever the function name appears/acting just like a variable name. (1 per -, max 2) [2] (c) Repeat Compare new value with root value -If > root value then follow right subtree -Else follow left subtree -Until no subtree -Insert new value as root of new subtree. (1 per -, max 4) (Allow symmetric algorithm) [4] © UCLES 2009 www.xtremepapers.net
  • 3. Page 3 Mark Scheme: Teachers’ version Syllabus Paper GCE A LEVEL – May/June 2009 9691 03 (d) (i) -Used to combine already compiled procedures -with compiled program… -to create an executable file. -Deals with external references. (ii) -Copies object code into… -(primary) memory ready for execution. -Deals with addressing anomalies, -particularly relocatable addressing (1 per -, max 2 per dotty, max 4) [4] 3 (a) -Goods offered for sale on electronic communication medium/Internet -Buyer orders goods by providing personal information on Internet.. -including bank account/credit card/other payment details. -data transfer must be secure -that firm offering goods is genuine -that buyer is genuine -Goods dispatched to purchaser after payment checked. (1 per -, max 3) [3] (b) -Enlarges market… -now worldwide rather than just local base. -Opens up richer markets where higher prices can be charged. -Sells 24/7 -No need for expensive overheads -No need to employ large number of sales staff (1 per -, max 4) [4] 4 (a) CUSTOMER ACCOUNT [1] (b) (i) Many to many. [1] (ii) ACCOUNT LINK STOCK Marks: -Use of Link table with sensible and descriptive name -ACCOUNT to LINK is One to Many -LINK to STOCK is Many to ONE. (1 per -, max 2) [2] © UCLES 2009 www.xtremepapers.net
  • 4. Page 4 Mark Scheme: Teachers’ version Syllabus Paper GCE A LEVEL – May/June 2009 9691 03 (c) (i) -A unique identifier for a record -e.g. Customer ID. [2] (ii) A field/item, not the primary key, offering an alternative identification for the record (not necessarily unique.) -e.g. Postal area (to arrange delivery schedules). [2] (iii) -A field/item in one table which is a primary key in another table/acts as a link between tables. -Account number in customer table links records to relevant account in account table. [2] (d) -Confidential/Personal data of a sensitive type. -Will have guaranteed privacy of data to customers. -Must comply with legislation protecting data. -Do not want to lose any data or have data maliciously altered/used Important to maintain data integrity. -Passwords to get onto system… -and into different tables… -in hierarchical fashion… -giving different access rights/RO or RW… -and providing different views of the data -Physical protection by (e.g.) locking system terminals away/iris recognition/fingerprints/…. -Protecting system with firewalls etc. (1 per -, max 6) [6] 5 (a) -Concept of a stored program -Instructions and data use the same (primary) memory -Use of a single processor -Follows a sequential set of instructions. (1 per -, max 3) [3] (b) (i) -201/202 (Sensible value) -because, once sent to MAR the value in the PC is incremented [2] (ii) -The result of a jump instruction which… -requires that the next instruction is not to be handled in sequence/specifically, that held in 180. [2] 6 (a) (i) 11011010 (ii) 10100110 (1 per dotty) [2] (b) (i) -The fractional part of the representation -Place value of MSB is –1… -remainder of bits are ½, ¼… -Holds the magnitude of the data. (1 per -, max 2) [2] © UCLES 2009 www.xtremepapers.net
  • 5. Page 5 Mark Scheme: Teachers’ version Syllabus Paper GCE A LEVEL – May/June 2009 9691 03 (ii) -Is a two’s complement integer which… -holds the power of 2… -by which the mantissa must be multiplied... -to give the original value. (1 per -, max 2) [2] (iii) 0.0101011 * 10 ^ 0101 = 1010.11 =8+2+½+¼ Alternative: 10 = 1010 and .75 = .11 10.75 = 00101011 x 10^101 Point moves 5 places (1 per line, max 3) [3] (iv) 01010110 0100 (1 for mantissa, 1 for exponent) [2] 7 (a) -A series of bars representing time to be taken on… -the different tasks which are needed to produce the system… -and relative timings of tasks. -Shows when different resources are going to be required/when they should be booked. -Also shows reliance of one task on the completion of another. -Will show how long the whole system should take to complete. (1 per -, max 4) [4] (b) -A series of manuals to explain the software… -in printed form and/or on screen. -Overview of package/contents page/index/glossary/… -Sample inputs/outputs. -Explanation of error messages. -Installation of software/hardware. -Quick reference guide. -How to carry out simple maintenance (like reloading a till roll). (1 per -, max 6) [6] 8 (a) -Cheaper than waiting until real thing is built -May be impossible to alter things after building -Safer than testing in real life, e.g. evacuation procedures, using real people. -Impossible to carry out some tests, e.g. burning building down, when building complete. (1 per -, max 3) [3] © UCLES 2009 www.xtremepapers.net
  • 6. Page 6 Mark Scheme: Teachers’ version Syllabus Paper GCE A LEVEL – May/June 2009 9691 03 (b) (i) -Width of aisles.. -to be able to assess the number of people who can use the aisle at once. -Number of people in store… -evacuation times will depend on number of people. -Position of exits… -relative to groupings of people. -Number of exits… -should be kept as low as is safe, for security reasons. -Position of fire/spread of fire… -different positions will dictate flow of people/speed of spread. -Positions of different areas in store (e.g. bakery)… -some areas will attract crowds of shoppers. -Time taken for emergency services to arrive -expert help will alleviate the situation (1 per -, max 3 variables, max 6) [6] (ii) -Large quantities of data … -all interrelating with each other… -because some outcomes rely on outcomes of others. -Large quantities of processing required (1 per -, max 2) [2] 9 -Interrupt given a priority -Placed in queue with other interrupts to be done… -according to priority. -When it becomes the highest priority interrupt it is dealt with -Contents of special registers are placed on a stack/saved -Interrupt (and others) dealt with -values read from stack into special registers. -Check for interrupt(s) at end of each cycle before fetching next instruction -Vectored interrupts (1 per -, max 6) [6] © UCLES 2009 www.xtremepapers.net