0% found this document useful (0 votes)
100 views16 pages

Cambridge International AS & A Level: Computer Science 9618/13

This document is an examination paper for the Cambridge International AS & A Level Computer Science course, specifically for Paper 1 Theory Fundamentals for May/June 2024. It includes instructions for answering questions, a total of 75 marks, and covers topics such as binary addition, character sets, bitmap images, processor instruction sets, and database design. The paper consists of multiple questions requiring calculations, explanations, and SQL scripting related to computer science concepts.

Uploaded by

fanyuanlong
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
100 views16 pages

Cambridge International AS & A Level: Computer Science 9618/13

This document is an examination paper for the Cambridge International AS & A Level Computer Science course, specifically for Paper 1 Theory Fundamentals for May/June 2024. It includes instructions for answering questions, a total of 75 marks, and covers topics such as binary addition, character sets, bitmap images, processor instruction sets, and database design. The paper consists of multiple questions requiring calculations, explanations, and SQL scripting related to computer science concepts.

Uploaded by

fanyuanlong
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

* 0019655335901 * www.dynamicpapers.

com

,  ,

Cambridge International AS & A Level

¬OŠ. 3mIsW™EªQ‰f W
¬š–a=§h8Y‚~9]›ndf‚
¥UUU5•¥u• 5• EE uU
* 4 9 7 7 2 5 9 3 4 5 *

COMPUTER SCIENCE 9618/13


Paper 1 Theory Fundamentals May/June 2024

1 hour 30 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages.

DC (KS/SG) 329374/2
© UCLES 2024 [Turn over
* 0019655335902 * www.dynamicpapers.com

DO NOT WRITE IN THIS MARGIN


2
,  ,

1 (a) Complete the following description.

A kibibyte has a ................................................ prefix. Three kibibytes is the same

as ................................................ bytes.

A megabyte has a ................................................ prefix. Two terabytes is the same

as ................................................ gigabytes.
[4]

DO NOT WRITE IN THIS MARGIN


(b) Convert the denary number 241 to hexadecimal.

...................................................................................................................................................

............................................................................................................................................. [1]

(c) State what is meant by an overflow in binary addition.

...................................................................................................................................................

............................................................................................................................................. [1]

DO NOT WRITE IN THIS MARGIN


(d) Computers use character sets when representing characters in binary.

(i) Complete the table by identifying the number of bits each of the character sets allocates
to each character.

Character set Number of bits

ASCII

extended ASCII

Unicode

DO NOT WRITE IN THIS MARGIN


[1]

(ii) Explain how the word ‘Clock’ is represented by a character set.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]
DO NOT WRITE IN THIS MARGIN

ĬÍĊ®Ġ³íÉó×ęÅĪÔċèĞ×
© UCLES 2024 ĬĚĘâÀģäÒâïüÖĕġ¾ĜÞĂ
ĥąÅÕõõåĕåÅĥÕąąåÅÕÕ
9618/13/M/J/24
* 0019655335903 * www.dynamicpapers.com
DO NOT WRITE IN THIS MARGIN

3
,  ,

2 A photograph is stored as a bitmap image.

(a) The photograph has a resolution of 4000 pixels wide by 3000 pixels high. The bit depth is
4 bytes.

Calculate an estimate for the file size of the photograph in megabytes.

Show your working.

Working .....................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...................................................................................................................................................

...................................................................................................................................................

Answer ...................................... megabytes


[2]

(b) The photograph is compressed before being uploaded to a web server.

(i) Give three benefits of this photograph being compressed using lossy compression
instead of lossless compression.
DO NOT WRITE IN THIS MARGIN

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................
[3]
DO NOT WRITE IN THIS MARGIN

(ii) Explain how run-length encoding (RLE) will compress the photograph.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(c) Identify two elements of a bitmap image that can be changed to reduce its file size.

1 ................................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]
ĬÏĊ®Ġ³íÉó×ęÅĪÔĉèĞ×
© UCLES 2024 ĬĚėáÈĥàâ×ĉąēÁęĚĜÎĂ
ĥąµĕµĕÅõµµµÕąĥÅąÅÕ
9618/13/M/J/24 [Turn over
* 0019655335904 * www.dynamicpapers.com

DO NOT WRITE IN THIS MARGIN


4
,  ,

3 The following table shows part of the instruction set for a processor. The processor has two
registers: the Accumulator (ACC) and an Index Register (IX).

Instruction
Explanation
Opcode Operand
LDM #n Immediate addressing. Load the number n to ACC

Direct addressing. Load the contents of the location at the given


LDD <address>
address to ACC

DO NOT WRITE IN THIS MARGIN


Indirect addressing. The address to be used is at the given address.
LDI <address>
Load the contents of this second address to ACC
Indexed addressing. Form the address from <address> + the contents
LDX <address> of the index register. Copy the contents of this calculated address to
ACC
LDR #n Immediate addressing. Load the number n to IX

ADD #n/Bn/&n Add the number n to the ACC

ADD <address> Add the contents of the given address to the ACC

DEC <register> Subtract 1 from the contents of the register (ACC or IX)

DO NOT WRITE IN THIS MARGIN


SUB #n/Bn/&n Subtract the number n from the ACC

SUB <address> Subtract the contents of the given address from the ACC

INC <register> Add 1 to the contents of the register (ACC or IX)

<address> can be an absolute or a symbolic address


# denotes a denary number, e.g. #123
B denotes a binary number, e.g. B01001010
& denotes a hexadecimal number, e.g. &4A

DO NOT WRITE IN THIS MARGIN


DO NOT WRITE IN THIS MARGIN

ĬÍĊ®Ġ³íÉó×ęÅĪÒċèĠ×
© UCLES 2024 ĬĚėäÈğÎçäćþĜ쵼ȿĂ
ĥµĥĕõĕÅÕÕĕÅÕÅĥĥąÕÕ
9618/13/M/J/24
* 0019655335905 * www.dynamicpapers.com
DO NOT WRITE IN THIS MARGIN

5
,  ,

(a) The current contents of memory are shown:

Address Data

48 51
49 6
50 48
51 50
DO NOT WRITE IN THIS MARGIN

52 49
53 50
54 6

The current contents of the ACC and IX are shown:

ACC 2
IX 50

Complete the table by writing the content of the ACC after each program has run.
DO NOT WRITE IN THIS MARGIN

Program number Code ACC content

LDM #50
1 INC ACC
SUB #1

LDI 51
2
ADD 52

LDR #2
DO NOT WRITE IN THIS MARGIN

LDX 50
3
DEC ACC

LDD 52
4 SUB 54
INC ACC

[4]
DO NOT WRITE IN THIS MARGIN

ĬÏĊ®Ġ³íÉó×ęÅĪÒĉèĠ×
© UCLES 2024 ĬĚĘãÀĩÒ×ÕñóÍ·½ĠČÖĂ
ĥµĕÕµõåµÅĥĕÕÅąąÅÅÕ
9618/13/M/J/24 [Turn over
* 0019655335906 * www.dynamicpapers.com

DO NOT WRITE IN THIS MARGIN


6
,  ,

(b) The processor includes these bit manipulation instructions:

Instruction
Explanation
Opcode Operand
AND #n/Bn/&n Bitwise AND operation of the contents of ACC with the operand
Bitwise AND operation of the contents of ACC with the contents of
AND <address>
<address>
XOR #n/Bn/&n Bitwise XOR operation of the contents of ACC with the operand

DO NOT WRITE IN THIS MARGIN


Bitwise XOR operation of the contents of ACC with the contents of
XOR <address>
<address>
OR #n/Bn/&n Bitwise OR operation of the contents of ACC with the operand
Bitwise OR operation of the contents of ACC with the contents of
OR <address>
<address>
Bits in ACC are shifted logically n places to the left. Zeros are
LSL #n
introduced on the right-hand end
Bits in ACC are shifted logically n places to the right. Zeros are
LSR #n
introduced on the left-hand end

DO NOT WRITE IN THIS MARGIN


<address> can be an absolute or a symbolic address
# denotes a denary number, e.g. #123
B denotes a binary number, e.g. B01001010
& denotes a hexadecimal number, e.g. &4A

The current contents of memory are shown:

Address Data
100 00001101
101 10111110

DO NOT WRITE IN THIS MARGIN


102 11110011
103 00110111
104 00000000

The current content of the ACC is shown:

1 1 1 1 1 1 1 1
DO NOT WRITE IN THIS MARGIN

ĬÑĊ®Ġ³íÉó×ęÅĪÓĉåĞ×
© UCLES 2024 ĬĚėãÃģºÍÍöĂè×µýäæĂ
ĥĥµÕµÕåĕąąµÕąąåąĕÕ
9618/13/M/J/24
* 0019655335907 * www.dynamicpapers.com
DO NOT WRITE IN THIS MARGIN

7
,  ,

Complete the table by writing the content of the ACC after each instruction has run.

The binary number 11111111 is reloaded into the ACC before each instruction is run.

Instruction number Instruction ACC content

1 LSL #2

2 XOR 100
DO NOT WRITE IN THIS MARGIN

3 AND 103

[3]
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN

ĬÓĊ®Ġ³íÉó×ęÅĪÓċåĞ×
© UCLES 2024 ĬĚĘäËĥ¶ÝìĄïġă½ÙäÖĂ
ĥĥÅĕõµÅõĕõĥÕąĥÅÅąÕ
9618/13/M/J/24 [Turn over
* 0019655335908 * www.dynamicpapers.com

DO NOT WRITE IN THIS MARGIN


8
,   ,

4 A theatre wants to use a database to store data about the shows that are scheduled, their
customers and the seats that the customers have booked.

In the theatre:

• Each show can take place on multiple dates.


• Some dates can have more than one performance.
• There are multiple rows of seats.
• Each seat can be individually booked by its row letter and seat number, for example row E
seat 2.

DO NOT WRITE IN THIS MARGIN


Part of the database design includes these tables:
SHOW(ShowID, Title, Duration)
SEAT(SeatID, RowLetter, SeatNumber)
PERFORMANCE(PerformanceID, ShowID, ShowDate, StartTime)

(a) Identify the relationship between the tables PERFORMANCE and SHOW.

...................................................................................................................................................

............................................................................................................................................. [1]

DO NOT WRITE IN THIS MARGIN


(b) Sample data for the table PERFORMANCE is shown:

PerformanceID ShowID ShowDate StartTime

0001 MK12 5/5/2025 13:00


0002 MK12 5/5/2025 19:30
0003 MK12 6/5/2025 19:00
0004 OP3 7/5/2025 18:30
0005 OP3 8/5/2025 18:30
0006 OP3 9/5/2025 13:00

DO NOT WRITE IN THIS MARGIN


Write a Structured Query Language (SQL) script to define the table PERFORMANCE.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]
ĬÑĊ®Ġ³íÉó×ęÅĪÑĉåĠ×
© UCLES 2024 ĬĚĘáËğÈìÏþøĪáġû´ÞĂ
ĥÕĕĕµµÅÕõÕĕÕÅĥĥÅĕÕ
9618/13/M/J/24
* 0019655336009 * www.dynamicpapers.com
DO NOT WRITE IN THIS MARGIN

9
,  ,

(c) Write an SQL script to return the number of times each show is scheduled. For example, in
the sample data in part (b), the show MK12 is scheduled three times.

The result needs to include the show name and a suitable field name for the number of times
it is scheduled.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(d) Customers give their first name, last name and email address when they are making a
DO NOT WRITE IN THIS MARGIN

booking. One booking can include multiple seats.

Describe the additional tables that will need to be included in the database and explain how
these tables will be linked within the database.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [5]
DO NOT WRITE IN THIS MARGIN

ĬÓĉ¯Ġ³íÉó×ęÅĪÒĉåĠ×
© UCLES 2024 ĬĚĘãÈĤ·¾àÿČÍĚáûĄÖĂ
ĥĥµÕµĕĥµĕÕµÕąåĥąåÕ
9618/13/M/J/24 [Turn over
* 0019655336010 * www.dynamicpapers.com

DO NOT WRITE IN THIS MARGIN


10
, ,

5 A multimedia design company has an office with a LAN (local area network). The LAN can have
up to 20 devices connected with cables and other devices connected using wireless access.

(a) The company has private cloud storage for its employees to store their work.

(i) Define the term private cloud.

...........................................................................................................................................

..................................................................................................................................... [1]

DO NOT WRITE IN THIS MARGIN


(ii) Describe the benefits to the company of using private cloud storage instead of public
cloud storage.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

DO NOT WRITE IN THIS MARGIN


..................................................................................................................................... [3]

(b) Part of the internal structure of the wired LAN is a star topology.

Explain how packets are transmitted between two devices in a star topology.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

DO NOT WRITE IN THIS MARGIN


............................................................................................................................................. [2]

DO NOT WRITE IN THIS MARGIN

ĬÑĉ¯Ġ³íÉó×ęÅĪÓċçĞ×
© UCLES 2024 ĬĚĖäÅĨ³ì×òî²âÛ˼ÎĂ
ĥµåÕõõåÕåĕĥĕąĥąÅąÕ
9618/13/M/J/24
* 0019655336011 * www.dynamicpapers.com
DO NOT WRITE IN THIS MARGIN

11
, ,

(c) A different part of the network uses the Ethernet protocol.

(i) A collision is detected.

Describe how the collision is managed using Carrier Sense Multiple Access/Collision
Detection (CSMA/CD).

...........................................................................................................................................

...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Identify two drawbacks of using CSMA/CD.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...........................................................................................................................................
[2]

(d) The devices in the office have static private IP addresses.

State what is meant by a static private IP address.

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [1]
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN

ĬÓĉ¯Ġ³íÉó×ęÅĪÓĉçĞ×
© UCLES 2024 ĬĚĕã½Ģ¯ÜâĈă÷öãď¼ÞĂ
ĥµÕĕµĕŵµĥµĕąąĥąĕÕ
9618/13/M/J/24 [Turn over
* 0019655336012 * www.dynamicpapers.com

DO NOT WRITE IN THIS MARGIN


12
, ,

6 Each of the following truth tables has three inputs (A, B and C) and one output (X).

Draw one line to match each truth table with its logic expression.

Truth table Logic expression

A B C X
0 0 0 0 NOT (A XOR B) AND C
0 0 1 1

DO NOT WRITE IN THIS MARGIN


0 1 0 0
0 1 1 0
1 0 0 1
1 0 1 1
1 1 0 0
(A OR C) AND NOT B
1 1 1 0

A B C X
0 0 0 0

DO NOT WRITE IN THIS MARGIN


0 0 1 1
0 1 0 0
0 1 1 0 A NAND B NAND C
1 0 0 0
1 0 1 0
1 1 0 0
1 1 1 1

DO NOT WRITE IN THIS MARGIN


A B C X
(A NAND B) OR C
0 0 0 1
0 0 1 1
0 1 0 1
0 1 1 1
1 0 0 1
1 0 1 1
NOT (A AND B AND C)
1 1 0 0
DO NOT WRITE IN THIS MARGIN

1 1 1 1
[3]

ĬÑĉ¯Ġ³íÉó×ęÅĪÑċçĠ×
© UCLES 2024 ĬĚĕâ½Ĭ½ÍÕĊČðØÿ­ìÖĂ
ĥąąĕõĕÅĕÕÅÅĕÅąÅąąÕ
9618/13/M/J/24
* 0019655336013 * www.dynamicpapers.com
DO NOT WRITE IN THIS MARGIN

13
, ,

7 Robots are used to serve food and drink to customers at a restaurant.


DO NOT WRITE IN THIS MARGIN

(a) A robot navigates through the restaurant to the table it is serving.

Complete the table by identifying two sensors that can be included in the robot and the
purpose of each sensor in the navigation system.
DO NOT WRITE IN THIS MARGIN

Sensor Purpose of sensor in navigation system

.............................................. ..........................................................................................

.............................................. ..........................................................................................

.............................................. ..........................................................................................

.............................................. ..........................................................................................
[2]
DO NOT WRITE IN THIS MARGIN

(b) The robot uses Artificial Intelligence (AI) to communicate with the customers. The customers
speak to the robot to order their food and drinks.

Explain how AI will be used in this part of the robot.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]
ĬÓĉ¯Ġ³íÉó×ęÅĪÑĉçĠ×
© UCLES 2024 ĬĚĖáÅĞÁÝäðõ¹Ą÷ĩìæĂ
ĥąõÕµõåõŵĕĕÅĥåÅĕÕ
9618/13/M/J/24 [Turn over
* 0019655336014 * www.dynamicpapers.com

DO NOT WRITE IN THIS MARGIN


14
, ,

(c) The navigation system can be considered an example of a control system.

Describe how feedback is used in a control system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

DO NOT WRITE IN THIS MARGIN


(d) The robot includes a touchscreen for the customer to make their payment.

Describe the principal operation of a touchscreen.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

DO NOT WRITE IN THIS MARGIN


...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

DO NOT WRITE IN THIS MARGIN


DO NOT WRITE IN THIS MARGIN

ĬÍĉ¯Ġ³íÉó×ęÅĪÒĊæĢ×
© UCLES 2024 ĬĚĕãÈĤ®ÕÒúòĖàÞĝĜÞĂ
ĥåõĕõĕĥÕååĕÕąåąąÅÕ
9618/13/M/J/24
* 0019655336015 * www.dynamicpapers.com
DO NOT WRITE IN THIS MARGIN

15
, ,

(e) Program libraries were used when writing the robot’s software.

(i) State what is meant by a program library.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Some program libraries include Dynamic Link Library (DLL) files.

Describe the benefits of a programmer using a library with DLL files instead of using a
DO NOT WRITE IN THIS MARGIN

library that does not include DLL files.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN

ĬÏĉ¯Ġ³íÉó×ęÅĪÒČæĢ×
© UCLES 2024 ĬĚĖäÀĦ²åçĀÿÓüÖ¹ĜÎĂ
ĥåąÕµõąµµÕÅÕąÅĥÅÕÕ
9618/13/M/J/24 [Turn over
* 0019655336016 * www.dynamicpapers.com

DO NOT WRITE IN THIS MARGIN


16
, ,

(f) The data from the robots is transmitted to a central computer using a wireless connection.

(i) Complete the table by identifying and describing two methods of data verification that
can be used during data transfer.

Method Description
1
..........................................................................................

......................................... ..........................................................................................

DO NOT WRITE IN THIS MARGIN


......................................... ..........................................................................................

..........................................................................................

..........................................................................................

..........................................................................................

2
..........................................................................................

DO NOT WRITE IN THIS MARGIN


......................................... ..........................................................................................

......................................... ..........................................................................................

..........................................................................................

..........................................................................................

..........................................................................................

[4]

(ii) Explain how encryption can protect the security of data during transmission.

DO NOT WRITE IN THIS MARGIN


...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]
DO NOT WRITE IN THIS MARGIN

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
ĬÍĉ¯Ġ³íÉó×ęÅĪÔĊæĤ×
© UCLES 2024 ĬĚĖáÀĠÄäÔĂĈÜÚúěČæĂ
ĥĕÕÕõõąĕÕõµÕÅÅÅÅÅÕ
9618/13/M/J/24

You might also like