Cambridge International AS & A Level: Computer Science 9618/13
Cambridge International AS & A Level: Computer Science 9618/13
com
¬O. 3mIsWEªQf W
¬a=§h8Y~9]ndf
¥UUU5¥u 5 EE uU
* 4 9 7 7 2 5 9 3 4 5 *
1 hour 30 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (KS/SG) 329374/2
© UCLES 2024 [Turn over
* 0019655335902 * www.dynamicpapers.com
as ................................................ bytes.
as ................................................ gigabytes.
[4]
...................................................................................................................................................
............................................................................................................................................. [1]
...................................................................................................................................................
............................................................................................................................................. [1]
(i) Complete the table by identifying the number of bits each of the character sets allocates
to each character.
ASCII
extended ASCII
Unicode
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
DO NOT WRITE IN THIS MARGIN
ĬÍĊ®Ġ³íÉó×ęÅĪÔċèĞ×
© UCLES 2024 ĬĚĘâÀģäÒâïüÖĕġ¾ĜÞĂ
ĥąÅÕõõåĕåÅĥÕąąåÅÕÕ
9618/13/M/J/24
* 0019655335903 * www.dynamicpapers.com
DO NOT WRITE IN THIS MARGIN
3
, ,
(a) The photograph has a resolution of 4000 pixels wide by 3000 pixels high. The bit depth is
4 bytes.
Working .....................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...................................................................................................................................................
...................................................................................................................................................
(i) Give three benefits of this photograph being compressed using lossy compression
instead of lossless compression.
DO NOT WRITE IN THIS MARGIN
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
DO NOT WRITE IN THIS MARGIN
(ii) Explain how run-length encoding (RLE) will compress the photograph.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(c) Identify two elements of a bitmap image that can be changed to reduce its file size.
1 ................................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
ĬÏĊ®Ġ³íÉó×ęÅĪÔĉèĞ×
© UCLES 2024 ĬĚėáÈĥàâ×ĉąēÁęĚĜÎĂ
ĥąµĕµĕÅõµµµÕąĥÅąÅÕ
9618/13/M/J/24 [Turn over
* 0019655335904 * www.dynamicpapers.com
3 The following table shows part of the instruction set for a processor. The processor has two
registers: the Accumulator (ACC) and an Index Register (IX).
Instruction
Explanation
Opcode Operand
LDM #n Immediate addressing. Load the number n to ACC
ADD <address> Add the contents of the given address to the ACC
DEC <register> Subtract 1 from the contents of the register (ACC or IX)
SUB <address> Subtract the contents of the given address from the ACC
ĬÍĊ®Ġ³íÉó×ęÅĪÒċèĠ×
© UCLES 2024 ĬĚėäÈğÎçäćþĜ쵼ȿĂ
ĥµĥĕõĕÅÕÕĕÅÕÅĥĥąÕÕ
9618/13/M/J/24
* 0019655335905 * www.dynamicpapers.com
DO NOT WRITE IN THIS MARGIN
5
, ,
Address Data
48 51
49 6
50 48
51 50
DO NOT WRITE IN THIS MARGIN
52 49
53 50
54 6
ACC 2
IX 50
Complete the table by writing the content of the ACC after each program has run.
DO NOT WRITE IN THIS MARGIN
LDM #50
1 INC ACC
SUB #1
LDI 51
2
ADD 52
LDR #2
DO NOT WRITE IN THIS MARGIN
LDX 50
3
DEC ACC
LDD 52
4 SUB 54
INC ACC
[4]
DO NOT WRITE IN THIS MARGIN
ĬÏĊ®Ġ³íÉó×ęÅĪÒĉèĠ×
© UCLES 2024 ĬĚĘãÀĩÒ×ÕñóÍ·½ĠČÖĂ
ĥµĕÕµõåµÅĥĕÕÅąąÅÅÕ
9618/13/M/J/24 [Turn over
* 0019655335906 * www.dynamicpapers.com
Instruction
Explanation
Opcode Operand
AND #n/Bn/&n Bitwise AND operation of the contents of ACC with the operand
Bitwise AND operation of the contents of ACC with the contents of
AND <address>
<address>
XOR #n/Bn/&n Bitwise XOR operation of the contents of ACC with the operand
Address Data
100 00001101
101 10111110
1 1 1 1 1 1 1 1
DO NOT WRITE IN THIS MARGIN
ĬÑĊ®Ġ³íÉó×ęÅĪÓĉåĞ×
© UCLES 2024 ĬĚėãÃģºÍÍöĂè×µýäæĂ
ĥĥµÕµÕåĕąąµÕąąåąĕÕ
9618/13/M/J/24
* 0019655335907 * www.dynamicpapers.com
DO NOT WRITE IN THIS MARGIN
7
, ,
Complete the table by writing the content of the ACC after each instruction has run.
The binary number 11111111 is reloaded into the ACC before each instruction is run.
1 LSL #2
2 XOR 100
DO NOT WRITE IN THIS MARGIN
3 AND 103
[3]
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN
ĬÓĊ®Ġ³íÉó×ęÅĪÓċåĞ×
© UCLES 2024 ĬĚĘäËĥ¶ÝìĄïġă½ÙäÖĂ
ĥĥÅĕõµÅõĕõĥÕąĥÅÅąÕ
9618/13/M/J/24 [Turn over
* 0019655335908 * www.dynamicpapers.com
4 A theatre wants to use a database to store data about the shows that are scheduled, their
customers and the seats that the customers have booked.
In the theatre:
(a) Identify the relationship between the tables PERFORMANCE and SHOW.
...................................................................................................................................................
............................................................................................................................................. [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
ĬÑĊ®Ġ³íÉó×ęÅĪÑĉåĠ×
© UCLES 2024 ĬĚĘáËğÈìÏþøĪáġû´ÞĂ
ĥÕĕĕµµÅÕõÕĕÕÅĥĥÅĕÕ
9618/13/M/J/24
* 0019655336009 * www.dynamicpapers.com
DO NOT WRITE IN THIS MARGIN
9
, ,
(c) Write an SQL script to return the number of times each show is scheduled. For example, in
the sample data in part (b), the show MK12 is scheduled three times.
The result needs to include the show name and a suitable field name for the number of times
it is scheduled.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(d) Customers give their first name, last name and email address when they are making a
DO NOT WRITE IN THIS MARGIN
Describe the additional tables that will need to be included in the database and explain how
these tables will be linked within the database.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [5]
DO NOT WRITE IN THIS MARGIN
ĬÓĉ¯Ġ³íÉó×ęÅĪÒĉåĠ×
© UCLES 2024 ĬĚĘãÈĤ·¾àÿČÍĚáûĄÖĂ
ĥĥµÕµĕĥµĕÕµÕąåĥąåÕ
9618/13/M/J/24 [Turn over
* 0019655336010 * www.dynamicpapers.com
5 A multimedia design company has an office with a LAN (local area network). The LAN can have
up to 20 devices connected with cables and other devices connected using wireless access.
(a) The company has private cloud storage for its employees to store their work.
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
(b) Part of the internal structure of the wired LAN is a star topology.
Explain how packets are transmitted between two devices in a star topology.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
ĬÑĉ¯Ġ³íÉó×ęÅĪÓċçĞ×
© UCLES 2024 ĬĚĖäÅĨ³ì×òî²âÛ˼ÎĂ
ĥµåÕõõåÕåĕĥĕąĥąÅąÕ
9618/13/M/J/24
* 0019655336011 * www.dynamicpapers.com
DO NOT WRITE IN THIS MARGIN
11
, ,
Describe how the collision is managed using Carrier Sense Multiple Access/Collision
Detection (CSMA/CD).
...........................................................................................................................................
...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...........................................................................................................................................
..................................................................................................................................... [2]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...........................................................................................................................................
[2]
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [1]
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN
ĬÓĉ¯Ġ³íÉó×ęÅĪÓĉçĞ×
© UCLES 2024 ĬĚĕã½Ģ¯ÜâĈă÷öãď¼ÞĂ
ĥµÕĕµĕŵµĥµĕąąĥąĕÕ
9618/13/M/J/24 [Turn over
* 0019655336012 * www.dynamicpapers.com
6 Each of the following truth tables has three inputs (A, B and C) and one output (X).
Draw one line to match each truth table with its logic expression.
A B C X
0 0 0 0 NOT (A XOR B) AND C
0 0 1 1
A B C X
0 0 0 0
1 1 1 1
[3]
ĬÑĉ¯Ġ³íÉó×ęÅĪÑċçĠ×
© UCLES 2024 ĬĚĕâ½Ĭ½ÍÕĊČðØÿìÖĂ
ĥąąĕõĕÅĕÕÅÅĕÅąÅąąÕ
9618/13/M/J/24
* 0019655336013 * www.dynamicpapers.com
DO NOT WRITE IN THIS MARGIN
13
, ,
Complete the table by identifying two sensors that can be included in the robot and the
purpose of each sensor in the navigation system.
DO NOT WRITE IN THIS MARGIN
.............................................. ..........................................................................................
.............................................. ..........................................................................................
.............................................. ..........................................................................................
.............................................. ..........................................................................................
[2]
DO NOT WRITE IN THIS MARGIN
(b) The robot uses Artificial Intelligence (AI) to communicate with the customers. The customers
speak to the robot to order their food and drinks.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
ĬÓĉ¯Ġ³íÉó×ęÅĪÑĉçĠ×
© UCLES 2024 ĬĚĖáÅĞÁÝäðõ¹Ą÷ĩìæĂ
ĥąõÕµõåõŵĕĕÅĥåÅĕÕ
9618/13/M/J/24 [Turn over
* 0019655336014 * www.dynamicpapers.com
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
ĬÍĉ¯Ġ³íÉó×ęÅĪÒĊæĢ×
© UCLES 2024 ĬĚĕãÈĤ®ÕÒúòĖàÞĝĜÞĂ
ĥåõĕõĕĥÕååĕÕąåąąÅÕ
9618/13/M/J/24
* 0019655336015 * www.dynamicpapers.com
DO NOT WRITE IN THIS MARGIN
15
, ,
(e) Program libraries were used when writing the robot’s software.
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) Some program libraries include Dynamic Link Library (DLL) files.
Describe the benefits of a programmer using a library with DLL files instead of using a
DO NOT WRITE IN THIS MARGIN
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN
ĬÏĉ¯Ġ³íÉó×ęÅĪÒČæĢ×
© UCLES 2024 ĬĚĖäÀĦ²åçĀÿÓüÖ¹ĜÎĂ
ĥåąÕµõąµµÕÅÕąÅĥÅÕÕ
9618/13/M/J/24 [Turn over
* 0019655336016 * www.dynamicpapers.com
(f) The data from the robots is transmitted to a central computer using a wireless connection.
(i) Complete the table by identifying and describing two methods of data verification that
can be used during data transfer.
Method Description
1
..........................................................................................
......................................... ..........................................................................................
..........................................................................................
..........................................................................................
..........................................................................................
2
..........................................................................................
......................................... ..........................................................................................
..........................................................................................
..........................................................................................
..........................................................................................
[4]
(ii) Explain how encryption can protect the security of data during transmission.
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
DO NOT WRITE IN THIS MARGIN
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
ĬÍĉ¯Ġ³íÉó×ęÅĪÔĊæĤ×
© UCLES 2024 ĬĚĖáÀĠÄäÔĂĈÜÚúěČæĂ
ĥĕÕÕõõąĕÕõµÕÅÅÅÅÅÕ
9618/13/M/J/24