SlideShare una empresa de Scribd logo
1 de 8
Descargar para leer sin conexión
UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS
                               General Certificate of Education
                               Advanced Subsidiary Level and Advanced Level



               COMPUTING                                                                                              9691/12
               Paper 1                                                                             October/November 2009
                                                                                                        2 hours 30 minutes
               Additional Materials:     Answer Booklet/Paper
*9022551224*




               READ THESE INSTRUCTIONS FIRST

               If you have been given an Answer Booklet, follow the instructions on the front cover of the Booklet.
               Write your Centre number, candidate number and name on all the work you hand in.
               Write in dark blue or black pen.
               You may use a soft pencil for any diagrams, graphs or rough working.
               Do not use staples, paper clips, highlighters, glue or correction fluid.

               Answer all questions.

               At the end of the examination, fasten all your work securely together.
               The number of marks is given in brackets [ ] at the end of each question or part question.




                                       This document consists of 5 printed pages and 3 blank pages.

               IB09 11_9691_12/3RP
               © UCLES 2009                                                                                       [Turn over




                                               www.xtremepapers.net
2

1   A student has a stand-alone computer at home and also uses the computers at school. She uses
    a USB stick, a DVD-RW drive and a CD-ROM drive on her home computer.

    (a) State a use that the student could make of each of the following, justifying your choices.

         (i) USB stick                                                                               [2]

         (ii) DVD-RW drive                                                                           [2]

         (iii) CD-ROM drive.                                                                         [2]

    (b) State one other storage device that the student would need at home and say why it would be
        needed.                                                                                 [2]


2   (a) Define the following types of software:

         (i) operating system software,

         (ii) generic applications software,

         (iii) translator software,

         (iv) utility software.                                                                      [4]

    (b) A computer system is based in a chemical factory. The chemical processes are all
        automatically controlled by the computer system which is operated from a central point.

         Discuss why it is important to have a good interface design on the system.                  [6]




© UCLES 2009                                   9691/12/O/N/09



                                  www.xtremepapers.net
3

3   A library stores details of members on the member file.

    (a) Members’ names are stored as strings of characters using ASCII.

         (i) State what is meant by a character set.                                                 [1]

         (ii) Describe how the ASCII character set is represented.                                   [3]

    (b) When a member's name is input to the system it needs to be validated.

         (i) State what is meant by validation.                                                      [1]

         (ii) Describe two validation checks that can be carried out when a member's name is input
              to the system.                                                                   [4]

    (c) The number of visits made by a member during the year is stored as an integer in a single
        byte. Mr Jyu has visited 135 times.

         Change 135 into the binary representation for the computer to store.                        [2]

    (d) The member file contains up to 10,000 records. The estimated size of each record is 250
        bytes.

         Estimate the size of the member file using appropriate units. (Show your working.)          [5]

    (e) Describe how the following types of software can be used in the library:

         (i) spreadsheet,                                                                            [2]

         (ii) presentation software,                                                                 [2]

         (iii) mail-merge software.                                                                  [2]


4   (a) A medical centre has a number of stand-alone computers. It is decided that these should be
        linked in a LAN.

         (i) State three advantages and one disadvantage of networking the computers.                [4]

         (ii) Explain the relationship between bit rates and the use of data content in a network.   [2]

    (b) Describe the additional hardware required when a LAN is connected to a WAN.                  [4]




© UCLES 2009                                  9691/12/O/N/09                                  [Turn over


                               www.xtremepapers.net
4

The remaining questions refer to the following information.

A large college has a cafeteria and an automated snack bar. Only staff and students of the college
are allowed to purchase food and drink there.


5   The college decides to computerise the accounts of the cafeteria. The manager needs to decide
    between using off-the-shelf software or custom-written software.

    (a) Explain the difference between off-the-shelf and custom-written software.                     [2]

    (b) State three advantages of using off-the-shelf software in this situation.                     [3]


6   It is decided to employ a systems analyst to produce the new computer system. The analyst
    follows the system life cycle.

    (a)


          Identification
           of problem
                      Feasibility study

                          Information collection

                                Analysis of problem

                                          Design of system

                                                   Development and
                                                          Testing
                                                                     Implementation
                                                                             Maintenance
                                                                                       Obsolescence


           The system life cycle is shown in the diagram. Explain why the cycle is considered to be an
           iterative process.                                                                       [3]

    (b) Describe how three parts of the feasibility study, carried out by the analyst, relate to the
        cafeteria and automated snack bar.                                                        [6]




© UCLES 2009                                        9691/12/O/N/09



                                   www.xtremepapers.net
5

7   Staff and students who buy food are identified by the system. Their purchases are charged to
    their accounts. These accounts are paid off at the end of each term.

    (a) Each student carries a magnetic stripe card to use with the system.

         (i) Describe how such a card works.                                                      [2]

         (ii) State two safeguards against improper use if it is stolen.                          [2]

    (b) Some members of staff are worried that their information may be misused. Data protection
        legislation is used to protect personal data.

         Describe the features of such legislation.                                               [6]

    (c) The total value of the goods which a person has bought is shown at a checkout. Each person
        is given a statement, informing them what they currently owe, at the end of each month.

         (i) Explain what is meant by a batch operating system and state which of the two processes
             would be carried out by a batch operating system.                                   [3]

         (ii) State a type of operating system which could be used for the other process described
              and justify your choice.                                                          [2]

    (d) Describe a report that a Management Information System (MIS) could produce from the
        collected data.                                                                  [2]


8   Candidates are advised to use either pseudo code or a flow diagram to answer this
    question, although other forms of algorithmic representation will be credited.

    The automated snack bar is a machine.

    The machine advertises 10 snack items; each one is given a number from 0 to 9.

    The user presses one of the buttons from 0 to 9 on the front of the machine. The machine checks
    in an array in its memory to find the price of the snack selected. This price is displayed on the
    front of the machine.

    The customer then inserts 1-cent and/or 5-cent coins. Each time a coin is input the machine
    subtracts the value from the amount still required. The display changes to show the new amount
    still required.

    When enough coins have been inserted the machine will deliver the item and pay out any change
    necessary.

    Write an algorithm to control the process of buying a snack.                                  [9]




© UCLES 2009                                  9691/12/O/N/09



                               www.xtremepapers.net
6

      BLANK PAGE




       9691/12/O/N/09



www.xtremepapers.net
7

      BLANK PAGE




       9691/12/O/N/09



www.xtremepapers.net
8

                                                                  BLANK PAGE




Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

University of Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of
Cambridge Local Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

                                                                     9691/12/O/N/09



                                              www.xtremepapers.net

Más contenido relacionado

Similar a Nov 09 P12

Similar a Nov 09 P12 (20)

Nov 05 P1
Nov 05 P1Nov 05 P1
Nov 05 P1
 
Nov 03 P1
Nov 03 P1Nov 03 P1
Nov 03 P1
 
Nov 08 P1
Nov 08 P1Nov 08 P1
Nov 08 P1
 
June 05 P1
June 05 P1June 05 P1
June 05 P1
 
June 10 P31
June 10 P31June 10 P31
June 10 P31
 
June 06 P1
June 06 P1June 06 P1
June 06 P1
 
Nov 06 P1
Nov 06 P1Nov 06 P1
Nov 06 P1
 
June 10 P32
June 10 P32June 10 P32
June 10 P32
 
Nov 05 P3
Nov 05 P3Nov 05 P3
Nov 05 P3
 
Nov 06 P3
Nov 06 P3Nov 06 P3
Nov 06 P3
 
June 10 P11
June 10 P11June 10 P11
June 10 P11
 
June 10 P12
June 10 P12June 10 P12
June 10 P12
 
June 08 P1
June 08 P1June 08 P1
June 08 P1
 
Nov 07 P3
Nov 07 P3Nov 07 P3
Nov 07 P3
 
June 06 P3
June 06 P3June 06 P3
June 06 P3
 
June 09 P1
June 09 P1June 09 P1
June 09 P1
 
June 03 P1
June 03 P1June 03 P1
June 03 P1
 
June 08 P3
June 08 P3June 08 P3
June 08 P3
 
June 07 P3
June 07 P3June 07 P3
June 07 P3
 
June 02 P1
June 02 P1June 02 P1
June 02 P1
 

Más de Samimvez

Más de Samimvez (20)

Sql installation tutorial
Sql installation tutorialSql installation tutorial
Sql installation tutorial
 
Example3
Example3Example3
Example3
 
Coms1010 exam paper - nov10
Coms1010   exam paper - nov10Coms1010   exam paper - nov10
Coms1010 exam paper - nov10
 
Coms1010 exam paper - may 08
Coms1010   exam paper - may 08Coms1010   exam paper - may 08
Coms1010 exam paper - may 08
 
Example2
Example2Example2
Example2
 
Labsheet 3
Labsheet 3Labsheet 3
Labsheet 3
 
Labsheet 3,5
Labsheet 3,5Labsheet 3,5
Labsheet 3,5
 
EQ V3x
EQ V3xEQ V3x
EQ V3x
 
Eq v2
Eq v2Eq v2
Eq v2
 
3.6
3.63.6
3.6
 
3.2
3.23.2
3.2
 
3.10
3.103.10
3.10
 
3.1
3.13.1
3.1
 
3.3
3.33.3
3.3
 
3.8
3.83.8
3.8
 
3.4
3.43.4
3.4
 
3.7
3.73.7
3.7
 
3.5
3.53.5
3.5
 
3.9
3.93.9
3.9
 
June 02 MS2
June 02 MS2June 02 MS2
June 02 MS2
 

Último

Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessUXDXConf
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FIDO Alliance
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 

Último (20)

Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 

Nov 09 P12

  • 1. UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS General Certificate of Education Advanced Subsidiary Level and Advanced Level COMPUTING 9691/12 Paper 1 October/November 2009 2 hours 30 minutes Additional Materials: Answer Booklet/Paper *9022551224* READ THESE INSTRUCTIONS FIRST If you have been given an Answer Booklet, follow the instructions on the front cover of the Booklet. Write your Centre number, candidate number and name on all the work you hand in. Write in dark blue or black pen. You may use a soft pencil for any diagrams, graphs or rough working. Do not use staples, paper clips, highlighters, glue or correction fluid. Answer all questions. At the end of the examination, fasten all your work securely together. The number of marks is given in brackets [ ] at the end of each question or part question. This document consists of 5 printed pages and 3 blank pages. IB09 11_9691_12/3RP © UCLES 2009 [Turn over www.xtremepapers.net
  • 2. 2 1 A student has a stand-alone computer at home and also uses the computers at school. She uses a USB stick, a DVD-RW drive and a CD-ROM drive on her home computer. (a) State a use that the student could make of each of the following, justifying your choices. (i) USB stick [2] (ii) DVD-RW drive [2] (iii) CD-ROM drive. [2] (b) State one other storage device that the student would need at home and say why it would be needed. [2] 2 (a) Define the following types of software: (i) operating system software, (ii) generic applications software, (iii) translator software, (iv) utility software. [4] (b) A computer system is based in a chemical factory. The chemical processes are all automatically controlled by the computer system which is operated from a central point. Discuss why it is important to have a good interface design on the system. [6] © UCLES 2009 9691/12/O/N/09 www.xtremepapers.net
  • 3. 3 3 A library stores details of members on the member file. (a) Members’ names are stored as strings of characters using ASCII. (i) State what is meant by a character set. [1] (ii) Describe how the ASCII character set is represented. [3] (b) When a member's name is input to the system it needs to be validated. (i) State what is meant by validation. [1] (ii) Describe two validation checks that can be carried out when a member's name is input to the system. [4] (c) The number of visits made by a member during the year is stored as an integer in a single byte. Mr Jyu has visited 135 times. Change 135 into the binary representation for the computer to store. [2] (d) The member file contains up to 10,000 records. The estimated size of each record is 250 bytes. Estimate the size of the member file using appropriate units. (Show your working.) [5] (e) Describe how the following types of software can be used in the library: (i) spreadsheet, [2] (ii) presentation software, [2] (iii) mail-merge software. [2] 4 (a) A medical centre has a number of stand-alone computers. It is decided that these should be linked in a LAN. (i) State three advantages and one disadvantage of networking the computers. [4] (ii) Explain the relationship between bit rates and the use of data content in a network. [2] (b) Describe the additional hardware required when a LAN is connected to a WAN. [4] © UCLES 2009 9691/12/O/N/09 [Turn over www.xtremepapers.net
  • 4. 4 The remaining questions refer to the following information. A large college has a cafeteria and an automated snack bar. Only staff and students of the college are allowed to purchase food and drink there. 5 The college decides to computerise the accounts of the cafeteria. The manager needs to decide between using off-the-shelf software or custom-written software. (a) Explain the difference between off-the-shelf and custom-written software. [2] (b) State three advantages of using off-the-shelf software in this situation. [3] 6 It is decided to employ a systems analyst to produce the new computer system. The analyst follows the system life cycle. (a) Identification of problem Feasibility study Information collection Analysis of problem Design of system Development and Testing Implementation Maintenance Obsolescence The system life cycle is shown in the diagram. Explain why the cycle is considered to be an iterative process. [3] (b) Describe how three parts of the feasibility study, carried out by the analyst, relate to the cafeteria and automated snack bar. [6] © UCLES 2009 9691/12/O/N/09 www.xtremepapers.net
  • 5. 5 7 Staff and students who buy food are identified by the system. Their purchases are charged to their accounts. These accounts are paid off at the end of each term. (a) Each student carries a magnetic stripe card to use with the system. (i) Describe how such a card works. [2] (ii) State two safeguards against improper use if it is stolen. [2] (b) Some members of staff are worried that their information may be misused. Data protection legislation is used to protect personal data. Describe the features of such legislation. [6] (c) The total value of the goods which a person has bought is shown at a checkout. Each person is given a statement, informing them what they currently owe, at the end of each month. (i) Explain what is meant by a batch operating system and state which of the two processes would be carried out by a batch operating system. [3] (ii) State a type of operating system which could be used for the other process described and justify your choice. [2] (d) Describe a report that a Management Information System (MIS) could produce from the collected data. [2] 8 Candidates are advised to use either pseudo code or a flow diagram to answer this question, although other forms of algorithmic representation will be credited. The automated snack bar is a machine. The machine advertises 10 snack items; each one is given a number from 0 to 9. The user presses one of the buttons from 0 to 9 on the front of the machine. The machine checks in an array in its memory to find the price of the snack selected. This price is displayed on the front of the machine. The customer then inserts 1-cent and/or 5-cent coins. Each time a coin is input the machine subtracts the value from the amount still required. The display changes to show the new amount still required. When enough coins have been inserted the machine will deliver the item and pay out any change necessary. Write an algorithm to control the process of buying a snack. [9] © UCLES 2009 9691/12/O/N/09 www.xtremepapers.net
  • 6. 6 BLANK PAGE 9691/12/O/N/09 www.xtremepapers.net
  • 7. 7 BLANK PAGE 9691/12/O/N/09 www.xtremepapers.net
  • 8. 8 BLANK PAGE Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will be pleased to make amends at the earliest possible opportunity. University of Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge. 9691/12/O/N/09 www.xtremepapers.net