1.5 System Software
1.5 System Software
STUDENTS NAME:
SCHOOL NAME:
shahzadah.ashraf 03332076121
@gmail.com
A Levels With
Sir Bande'Shah
Page 1 of 70
Cambridge International AS & A Level Computer Science 9618 syllabus for 2021, 2022 and 2023. Subject content
5 System Software
Page 2 of 70
Page 3 of 70
Chapter 5 Operating System
Features in Editors that Benefit Programming
Whatever language is used for writing source code and whatever compiler or interpreter is being used
there will be one or more IDEs available to assist the programmer. This section discusses the types of
feature that should be provided by an IDE.
Prettyprinting
Prettyprint refers to the presentation of the program code typed into an editor. For example, the
Python IDLE (see Figure 8.02) automatically colour-codes keywords, built-in function calls, comments,
strings and the identifier in a function header. In addition, indentation is automatic.
Context-sensitive prompts
This feature displays hints (or a choice of keywords) and available identifiers that might be appropriate
at the current insertion point of the program code. Figure 8.03 shows an example of the Visual Studio
editor responding to text typed in by the programmer.
2 Choose the
required
keyword
3 An explanation of the
chosen construct appears.
Pressing the TAB key twice
will put the
Page 4 of 70
Dynamic syntax checks
When a line has been typed, some editors perform syntax checks and alert the programmer to errors.
When working on program code consisting of many lines of code, it saves excessive scrolling if you can
collapse blocks of statements.
Debugging
If a Debugger feature has been switched on it is possible to select a breakpoint. When the program
starts running it will stop when it reaches the breakpoint. The program can then be stepped through,
one instruction at a time. Figure 8.05 shows the windows presented to the user in the Python IDLE
when this feature is being used.
Page 5 of 70
1.5.1 Operating System
Introduction
The operating system controls every task your computer carries out and
manages system resources.
Most people are familiar with the major operating systems on the
market. Microsoft Windows and Apple's Mac OS have celebrity status.
The various flavors of the Linux operating system are less-well known,
but that doesn't stop Linux fans from passionately defending their
favorite distribution. Then there's the host of mobile operating systems
on the market including Apple's iOS, Microsoft's Windows Phone and
Google's Android operating system.
But once you get beyond specifics, all operating systems share many traits. They may execute functions in
a way that's particular to that OS, but in the end, each system has to be able to complete basic tasks. Most
of these tasks you won't even notice -- unless things go terribly wrong.
Hardware Management
Page 6 of 70
Providing A Platform For Software/Apps
The operating system creates an abstract environment for programs. In a sense, the program tells the OS
what it needs in order to work properly. The operating system then can take care of the requirements by
allocating the physical resources available on the computer. It doesn't matter what type of hardware the
computer has -- the OS handles the details.
Without this feature, software engineers would have tough choices to make. They would have to write
programs for specific sets of components. If your computer's hardware didn't match that set selected by
the programmers, the program might not work at all on your machine. The operating system keeps things
running smoothly across multiple hardware configurations, freeing up software developers to concentrate
on making the best program they can write.
File Management
Programs need more than physical resources to get the job done.
Computers rely upon collections of data called files. These files
must follow a specific set of rules so that the computer can make
use of them. These rules govern file naming and storage practices.
We call the overall set of rules a file management system or simply
a file manager.
Without file management, the digital information inside your computer would be a useless jumble of data.
It's like piling everything you own into a single room -- you've got everything you need but there's no easy
way to lay your hands on any particular item at a given time. Because the operating system follows the
rules, we don't have to worry about manually allocating space on specific sections of memory for our files,
and we don't have to root around in a huge mess to find what we're looking for.
Page 7 of 70
Managing Memory
The operating system has to oversee memory usage to keep things
running smoothly.
How can you make your computer work faster? You might think
that a more powerful CPU will get the job done. But sometimes, all
you need is a little more memory to get things moving at a quicker
pace.
Memory is where your computer stores information that it will
need when the processor performs calculations. Think of it as a temporary storage facility. As you execute
programs, your computer's operating system allocates a certain amount of memory to each task. Data
stored in your computer's memory can transfer to and from the CPU quickly. If the CPU needs data that
isn't in your computer's memory, it has to look for the information in other places, such as a hard drive.
This takes longer than pulling data from memory and slows everything down.
The operating system manages memory allocation to minimize computer delays. There's only a finite
amount of memory available at any given time. Depending upon how many programs you're running
simultaneously, this can be a demanding and dynamic job. The operating system has to weigh each
process's requirements and make adjustments as they change. Ideally, it all goes so smoothly that
everything seems to run without a hitch.
CPU Management
The operating system works closely with a computer's CPU to process information.
Operating systems coordinate with a CPU to make sure everything runs smoothly. The OS might switch the
CPU's focus from one program to another as you switch active sessions on your computer. The OS acts like
a resource manager and if it works well, you won't even notice that the CPU is switching between jobs at
an incredibly rapid pace.
Page 8 of 70
1.5.2 Utility Programs
Utility software is a type of system software which has a very specific task to perform related to the
working of the computer, for example antivirus software, disk defragment etc.
Disk Formatter
The surface of a disk can store so much data that the computer cannot handle it all at once so it needs to
be split up so that data stored on it can be found again. When it is new a disk surface is blank so the
computer “draws lines” on the surface to split it into small areas. The process is called formatting and it is
carried out by a utility program called a disk formatter.
File Compressors
Some files are very large. In most files it is possible to find simple ways of reducing the size of the file while
keeping all its meaning. This can be very important when files are being sent from one computer to
another as the communication is speeded up. The programs that reduce the size of files are called file
compressors.
Virus checker
When files are being sent from one computer to another it is possible that they may contain a virus which
will infect the receiving computer. A virus checker (scanner, killer...) is a utility program which keeps a
constant check on files searching for viruses and deletes it if found.
Page 9 of 70
Disk Defragmenter Software
A disk defragmenter software is a utility that reorganizes the files and unused space on a computer’s hard
disk so that the operating system accesses data more quickly and programs run faster. When an operating
system stores data on a disk, it places the data in the first available sector on the disk. It attempts to place
data in sectors that are contiguous (next to each other), but this is not always possible. When the contents
of a file are scattered across two or more noncontiguous sectors, the file is fragmented.
Fragmentation slows down disk access and thus the performance of the entire computer. Defragmenting
the disk, or reorganizing it so that the files are stored in contiguous sectors, solves this problem. Operating
systems usually include a disk defragmenter. Windows disk defragmenter is available in the System Tools
list.
Disk Check
A Disk Check is a free utility that can help you scan your disk drives for errors and fix them. It can also scan
entire disk for bad sectors and try to recover them.
Main Features:
A backup software utility allows users to copy, or back up, selected files or an entire hard disk to another
storage medium such as an external hard disk, optical disc, USB flash drive, or tape.
During the backup process, the utility monitors progress and alerts you if it needs additional media, such as
another disc. Many backup programs compress, or shrink the size of, files during the backup process. By
compressing the files, the backup program requires less storage space for the backup files than for the
original files.
Because they are compressed, you usually cannot use backup files in their backed up form. In the event
you need to use a backup file, a restore utility reverses the process and returns backed up files to their
original form. Backup utilities work with a restore utility.
Page 10 of 70
1.5.3 Library Programs
Library programs are collections of compiled routines which are shared by multiple programs, such as the
printing function.
Library programs contain code and data that provide services to other programs such as interface (look and
feel), printing, network code and even the graphic engines of computer games. If you have ever wondered
why all Microsoft Office programs have the same look and feel, that is because they are using the same
graphical user interface libraries.
For computer games a developer might not have the time and budget to write a new graphics engine so
they often buy graphical libraries to speed up development, this will allow them to quickly develop a good
looking game that runs on the desired hardware. For example Battlefield 3 and Need for Speed both use
the same Frostbite engine.
Most programming languages have a standard set of libraries that can be used, offering code to handle
input/output, graphics and specialist math functions. You can also create your own custom libraries and
when you start to write lots of programs with similar functionality you'll find them very useful.
What Is A DLL?
A DLL is a library that contains code and data that can be used by more than one program at the same
time. For example, in Windows operating systems, the Comdlg32 DLL performs common dialog box related
functions. Therefore, each program can use the functionality that is contained in this DLL to implement an
Open dialog box. This helps promote code reuse and efficient memory usage.
By using a DLL, a program can be modularized into separate components. For example, an accounting
program may be sold by module. Each module can be loaded into the main program at run time if that
module is installed. Because the modules are separate, the load time of the program is faster, and a
module is only loaded when that functionality is requested.
Additionally, updates are easier to apply to each module without affecting other parts of the program. For
example, you may have a payroll program, and the tax rates change each year. When these changes are
isolated to a DLL, you can apply an update without needing to build or install the whole program again.
Page 11 of 70
1.5.4 Language Translators
Software that allows new programs to be written and run on computers, by converting source code
(human readable) into machine code. There are three types that we'll cover in a lot more detail shortly:
Assembler
An assembler translates assembly language into machine code. Assembly language consists of mnemonics
for machine opcodes so assemblers perform a 1:1 ratio translation from mnemonic to a direct instruction.
For example:
Page 12 of 70
Compiler
A Compiler is a computer program that translates code written in a high level language to a lower level
language, object/machine code. The most common reason for translating source code is to create an
executable program (converting from a high level language into machine language).
Source code is not included, therefore compiled code is more secure than interpreted code
Tends to produce faster code than interpreting source code
Produces an executable file, and therefore the program can be run without need of the source
code
Object code needs to be produced before a final executable file, this can be a slow process
The source code must be 100% correct for the executable file to be produced
Interpreter
An interpreter program executes other programs directly, running through program code and executing it
line-by-line. As it analyses every line, an interpreter is slower than running compiled code but it can take
less time to interpret program code than to compile and then run it.
This is very useful when prototyping and testing code. Interpreters are written for multiple platforms, this
means code written once can be run immediately on different systems without having to recompile for
each. Examples of this include flash based web programs that will run on your PC, MAC, games console and
Mobile phone.
Source code is required for the program to be executed, and this source code can be read making
it insecure
Interpreters are generally slower than compiled programs due to the per-line translation method.
Page 13 of 70
Partially Compiled And Partially Interpreted
Few of the high-level language programs may be partially compiled and partially interpreted, such as Java.
Typical Java environment consists of two programs:
Java compiler takes the source code written in Java programming language, together with precompiled
libraries, and compiles programs written in Java programming languages into class files containing Java
byte-code.
The Java Virtual Machine takes the byte code prepared by the Java compiler and executes it. The
byte-code itself is platform-independent; it is the responsibility of the Java Virtual Machine
implementation to execute the program in the byte-code form on the real computer.
So, the java code is partially compiled for optimization by the programmer. The user runs the code
on a Java virtual machine on their computers that interprets the java code for the users' computer
specific architecture.
Page 14 of 70
Page 15 of 70
1 Three examples of language translators and four definitions are shown below.
Draw lines to link each language translator to the correct one or more definitions.
Compiler
Assembler
Interpreter
[3]
9608/12/M/J/16
1 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
9608/13/M/J/16
Page 16 of 70
4 (a) (i) Explain why a personal computer (PC) needs an operating system (OS).
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(ii) One of the tasks carried out by the OS is the management of the use of the processor.
Name and describe two other management tasks that the OS performs.
1 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
(b) A user has the following issues with the use of their personal computer (PC).
For each case, state the utility software which should provide a solution.
(i) The user wants to send a large file as an attachment to an email. The user knows that
the recipient’s Internet Service Provider (ISP) has a limit of 2MB for file attachments.
(ii) The user is writing a book and is worried that the document files could get damaged or
deleted.
(iii) The computer has recently been slow to load large files. The user has deleted a large
number of small files to try to solve the problem. A friend has advised that there is a
procedure which should be regularly carried out to reorganise file storage on the hard
disk.
(iv) The user clicked on an attachment in an unsolicited email. Since then, the computer has
shown some unexplained behaviours.
9608/12/M/J/17 Page 17 of 70
6 (a) The operating system (OS) contains code for performing various management tasks.
The appropriate code is run when the user performs various actions.
Draw a line to link each OS management task to the appropriate user action.
(b) A user has the following issues with the use of his PC.
(i) The hard disk stores a large number of video files. The computer frequently runs out of
storage space.
(ii) The user is unable to find an important document. He thinks it was deleted in error some
weeks ago. This must not happen again.
(iv) There have been some unexplained images and advertisements appearing on the
screen. The user suspects it is malware.
9608/13/M/J/17 Page 18 of 70
1 An operating system (OS) is usually pre-installed on a new computer.
(a) The OS performs a number of different tasks such as file management and peripheral
management.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
(i) The following table lists four programs. Put one tick (3) in each row to indicate whether
or not the program is utility software.
Database
Virus checker
Web browser
Backup software
[4]
Program 1 .........................................................................................................................
Program 2 .........................................................................................................................
[2]
9608/12/M/J/18 Page 19 of 70
7
1 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(i) State one benefit of Kimmy using an interpreter during the development of the program.
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) State three benefits of Kimmy using a compiler when the program is complete.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
...........................................................................................................................................
..................................................................................................................................... [1]
State two benefits of Biyu using an interpreter instead of a compiler while writing the
program.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
..................................................................................................................................... [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(a) The following table lists key management tasks performed by an operating system and
their descriptions.
Complete the table by writing the missing management task names and descriptions.
Memory management
Provision of a software
platform
[4]
(b) A hard disk formatter and a hard disk defragmenter are two examples of utility software.
(i) Describe the actions performed by a hard disk formatter and a hard disk defragmenter.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
(ii) Identify three other examples of utility software that can be installed on the computer.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
(a) Describe the tasks performed by the operating system to manage the main memory in the
games console.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) The computer games are written in a high-level language. Bart does not need a compiler or
an interpreter to run the games he buys for his console.
Explain why the games run without the need for a compiler or an interpreter.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(c) When Bart is at work, he connects his work laptop to his employer’s Local Area Network
(LAN). The LAN has both a router and a gateway.
Give two similarities and one difference between a router and a gateway.
Similarity 1 ................................................................................................................................
...................................................................................................................................................
Similarity 2 ................................................................................................................................
...................................................................................................................................................
Difference .................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
(a) Complete the table by writing the name of the utility program for each description.
[3]
Tick (✓) one box on each row to indicate whether the action is an example of lossy
compression or lossless compression.
(c) Amir’s computer has system software, including utility software and an operating system.
(i) Explain how the disk formatter, disk contents analysis and disk repair utilities work
together.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
Task 1 ................................................................................................................................
...........................................................................................................................................
Task 2 ................................................................................................................................
...........................................................................................................................................
Task 3 ................................................................................................................................
...........................................................................................................................................
[3]
(iii) The peripheral devices are plugged into USB ports of the computer.
Describe two benefits of connecting the peripheral devices using a USB port.
1 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
(a) One of her friends has suggested using Dynamic Link Library (DLL) files to help them develop
the game.
(i) Give three reasons why Annchi and her friends should use DLL files when developing
the game.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
(ii) Give two reasons why Annchi and her friends should not use DLL files when developing
the game.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(b) Each member of the group is creating a different part of the game. Each person needs to test
their part of the game independently before they are combined.
Identify the most appropriate type of translator that should be used to test each part of the
game independently. Justify your choice.
Translator ..................................................................................................................................
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
11 A game program is written which can be either interpreted or compiled. The table below shows five
statements about the use of interpreters and compilers.
9608/13/O/N/15 Page 28 of 70
7 One management task carried out by an operating system is to provide a user interface.
1 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.............................................................................................................................. ............................
......................................................................................................................................................[4]
9608/12/O/N/16 Page 29 of 70
8 A programmer is writing a program that includes code from a program library.
(a) Describe two benefits to the programmer of using one or more library routines.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) The programmer decides to use a Dynamic Link Library (DLL) file.
1 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[4]
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
9608/12/O/N/16 Page 30 of 70
2 (b) (i) Explain why a computer needs an operating system.
...........................................................................................................................................
...........................................................................................................................................
.............................................................................................................................. .............
...........................................................................................................................................
.............................................................................................................................. .........[2]
(ii) Give two key management tasks carried out by an operating system.
1 ........................................................................................................................................
...........................................................................................................................................
2 .........................................................................................................................................
............
.............................................................................................................................. .........[2]
(c) New program code is to be written in a high-level language. The use of Dynamic Link Library
(DLL) files is considered in the design.
Describe what is meant by a DLL file.
...................................................................................................................................................
...................................................................................................................................................
.................[2]
...................................................................................................................................................
7 A small company produces scientific magazines. The owner buys some new desktop computers.
The computers are used to store thousands of colour images (diagrams and photographs). All the
computers have Internet access.
(a) Name three utility programs the company would use on all their computers. Describe what
each program does.
1 ................................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
Description ................................................................................................................................
.............................................................................................................................. .................[6]
..............................................................................................................................
9608/13/O/N/16 Page 31 of 70
1 One of the tasks of the operating system (OS) is the management of the main memory of the
computer system.
1 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[6]
9608/12/O/N/17 Page 32 of 70
2 (a) The diagram shows three items of software that translate program code.
Draw one line from each context to the correct item of translation software.
Assembler
Interpreter
Compiler
[4]
(b) A programmer is developing software and has both a compiler and interpreter for the
high-level language used.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(ii) Benefits of an interpreter
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
9608/12/O/N/17 Page 33 of 70
2 (a) The diagram shows three items of software that translate program code.
Draw one line from each context to the correct item of translation software.
Assembler
Interpreter
Compiler
...........................................................................................................................................
.......................................................................................................................................[1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
9608/13/O/N/17 Page 34 of 70
5
(b) Aaron’s computer has an operating system (OS). The OS manages the running processes
and provides a user interface.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
1 (a) The diagram shows different types of software on the left, and descriptions on the right.
Operating system
Utility program
Library program
Compiler
[4]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(a) Describe the following key management tasks that the mobile phone operating system carries
out.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
(i) Describe how sound sampling is used by the mobile phone to encode the sound.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
1 Identify the most appropriate utility program to use for each of the following tasks.
[4]
3 Hannah is writing a computer program using a high-level language. She uses both a compiler and
an interpreter.
(a) Describe the ways in which Hannah will use an interpreter while writing the program.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) Explain the reasons why Hannah uses a compiler when she has finished writing the program.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(c) Some high-level languages are partially compiled and partially interpreted.
Give one benefit and one drawback of using a language that is partially compiled and partially
interpreted.
Benefit ......................................................................................................................................
...................................................................................................................................................
Drawback ..................................................................................................................................
...................................................................................................................................................
[2]
Term Definition
Page 41 of 70
9608/12
Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED
4(a)(ii) One mark for the name and one mark for description. Max 4
Max two management tasks.
• Interrupt handling 1
Identifies priorities of interrupts // Saves data on power outage // Loads
appropriate Interrupt Service Routine (ISR) // By example 1
• Security management 1
Makes provision for recovery when data is lost // Provides usernames and
passwords // Prevents unauthorised access // Ensures privacy of data 1
Page 42 of 70
Cambridge International AS/A Level – Mark Scheme May/June 2017
9608/13
PUBLISHED
6(a) 3
One mark for each correct line from each left hand box to max three marks.
Page 43 of 70
9608/12 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED
Page 44 of 70
9608/11 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED
3(a)(i) 1 mark for each advantage, 1 mark for a valid expansion to max 2 × 2 4
• Product
• Software engineers shall ensure that their products and related
modifications meet the highest professional standards possible.
• Judgement
• Software engineers shall maintain integrity and independence in their
professional judgement.
• Management
• Software engineering managers and leaders shall subscribe to and
promote an ethical approach to the management of software
development and maintenance.
• Profession
• Software engineers shall advance the integrity and reputation of the
profession consistent with the public interest.
• Colleagues
• Software engineers shall be fair to and supportive of their colleagues.
• Self
• Software engineers shall participate in life-long learning regarding the
practice of their profession and shall promote an ethical approach to the
practice of the profession.
Data backup
• A copy of data will have been made and stored elsewhere.
• If the original is lost, the backup can be used to restore the data.
Disk-mirroring
• The data is stored on two disks simultaneously.
• If the first disk drive fails, the data is accessed from the second disk.
1(c) 1 mark per bullet point to max 4, max 3 for router, max 3 for gateway 4
Only award the repeated bullet points (1 to 5 in each section) once
Router:
• Connects two (or more) networks
• Can connect a network to a WAN // acts as the single access point
for
• Receives packets and forwards towards the destination
• using the IP address of the destination
• Assigns private IP addresses
• Operates between similar networks // networks using the same protocol
• Can be used to segment a network
Gateway:
• Connect two (or more) networks
• Can connect a network to a WAN // acts as the single access point
for
• Receives packets and send packets towards the destination
• using the IP address of the destination
• Assigns private IP addresses
• Connects two dissimilar networks // networks that use different
protocols
1(d) 1 mark per bullet point to max 3 for any valid answer 3
For example:
• File server
• Print server
• Proxy server
• Web server
• Application server
• Easier de-bugging
• because errors can be corrected in real time
• The effect of any change made to the code can be seen immediately
• Parts of the program can be tested, without all the program code being
available
Assembler
• The code is already written so the programmer is not starting over again
which saves time
• The code will have been used by many people so it should be already
thoroughly tested and relatively error-free / won’t need re-testing
• The programmer can use e.g. mathematical / graphics functions etc.
that he may not know how to code
• Use of named library functions can simplify the program and make it
easier to read
• The library routine code should conform to industry standards and
therefore contribute towards a more robust program
• Data movement
• Arithmetic operations
• (Unconditional and conditional) jump instructions
• Compare instructions
• Modes of addressing
1(b)(i) 1 mark per bullet point to max 2 for formatter, max 2 for defragmenter 4
For example:
• Backup software
• File compression
• Virus checker
• Disk contents analysis / repair
• CREATE (line 1)
• INTEGER (line 6)
• PRIMARY KEY (line 7)
• Software will have been built using a compiler // the software is pre-
compiled
• Software is an executable file // the game is already in machine code //
the game is already set-up to run on the console
• Source code is not provided so does not need compiling/interpreting
• A Router connects two networks using the same protocol, a Gateway can
connect two networks using different protocols
• Software will have been built using a compiler // the software is pre-
compiled
• Software is an executable file // the game is already in machine code //
the game is already set-up to run on the console
• Source code is not provided so does not need compiling/interpreting
• A Router connects two networks using the same protocol, a Gateway can
connect two networks using different protocols
2(c)(iii) 1 mark for benefit, 1 mark for expansion for max 2 benefits 4
A B C Working Space X
0 0 0 1
0 0 1 1
0 1 0 0
0 1 1 0
1 0 0 0
1 0 1 1
1 1 0 1
1 1 1 0
3(c) 1 mark for name, 1 mark for symbol matching the name 2
NAND
NOR
11
Page 56 of 70
Page 8 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9608 12
7 ONE mark per bullet point, MAX TWO marks per task.
• Security management
• Makes provision for recovery when data is lost
• Provides usernames and passwords / encryption / user accounts
• Prevents unauthorised access
• Ensures privacy of data
• Interrupt handling
• Identifies priorities of interrupts
• Save current memory / process values / saves data on power outage
• Loads appropriate Interrupt Service Routine (ISR)
• Any relevant example
[4]
Page 57 of 70
Page 9 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9608 12
8 (a) ONE mark for each bullet point from MAX TWO groups.
• The programmer can use, e.g. mathematical / graphics functions, etc. (may not know
how to code)
• Can be sure that the function will perform as it should // simplifies the program.
(b) (i) ONE mark for each benefit, and ONE mark for a further expansion.
• The executable file is smaller / the executable does not contain all the library
routines …
• … DLL files are only loaded into memory when required.
• Changes / improvements / error correction to the DLL file code are done
independently of the main program...
• … So there is no need to recompile the main program
• … All programs using it will benefit
(ii) ONE mark for each bullet point from MAX ONE group.
[2]
Page 58 of 70
Page 4 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9608 13
• Security management
• Interrupt handling
• Provision of a user interface run – only if not given in part (b)(i) [2]
(c) Any two from:
• A DLL file is a shared library file
• Code is saved separately from the main .EXE files
• Code is only loaded into main memory when required at run-time
• The DDL file can be made available to several applications (at the same time) [2]
7 (a) One mark for the name and one mark for the explanation for three utility programs
• Disk formatter
• Prepares a hard disk to allow data to be stored on it
• Virus checker
• Checks for viruses and then quarantines removes any virus found
• File compression
• Reduces file size by removing redundant details (lossy / lossless)
• Backup software
• Makes copy of files on another medium in case of corruption / loss of data
• Firewall
• Prevents unauthorised access to computer system from external sources [6]
Page 59 of 70
9608/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017
Interrupt Handling
• Halts the execution of the current process
• Stores the values of the current process on the stack
• Loads and executes the appropriate ISR code
• Use of priorities for handling simultaneous interrupts
• Saves data on power outage
Security Management
• Makes provision for recovery when data is lost
• Provides usernames and passwords / encryption / user accounts
• Prevents unauthorised access
• Ensures privacy of data
Page 60 of 70
9608/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017
• Once translated the compiler software is not needed to run the program
• Compiled code should execute faster
• Compiler produces an executable file
• The executable file produced by a compiler can be distributed without users
having sight of the source code // source code is kept secure // users are unable
to make changes to the program
• Cross-compilation is possible
• Easier de-bugging
• The interpreter stops when error encountered
• error can be corrected in real time
• The interpreter translates a statement then executes it immediately
• Parts of the program can be tested, without all the program code being available.
Page 61 of 70
9608/13 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017
Interpreter
Page 62 of 70
9608/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019
e.g.
• Trackpad/touchpad
• microphone
• touchscreen
• scanner
e.g.
• printer
• speakers
• touchscreen
2(b) 1 mark per bullet point to max 4 for each management task, max 6 in total 6
Process management:
• Manages the scheduling of processes
• « allows multi-tasking / multi-processing
• « ensures fair access
• « handles priorities
• Manages the resources the processes need
• Enables processes to share information
• Prevents interference between processes// resolution of conflicts
2(c) 1 mark per bullet point to max 3 for each utility program, max 4 in total 4
Virus checker:
• Scans files stored on a computer system for malicious code
• Scans files when they enter the system / memory stick inserted /
download etc.
• Sets up a schedule for virus-checking
• Isolates / quarantines / deletes viruses
• Regularly updates the virus definitions
Backup software:
• Creates a copy of the contents of a disk / partition. Can be set up to
automatically backup // schedules backups
• Allows the user to decide what is backed up, e.g. all data // all files that
have changed since the last backup
• Allows the user to set up an off-site backup
• May encrypt the backup files
• Restores the data if necessary
• A AND C
• B AND C
• D OR E
• (B AND C) AND (D OR E)
• Final OR
Disk repair:
• Checks for any errors / inconsistencies / bad sectors on the disk
• Resolves any errors on the disk
• Retrieves files / data from a damaged disk // re-constructs directory //
recovers disc when data corrupt
• Marks bad sectors on the disk // marks bad sectors as unusable
1(c)(i) 1 mark per bullet point to max 3 plus 1 mark for suitable example 4
1(c)(ii) 1 mark for each security method to max 2, 1 mark for integrity 3
Security
• encryption
• access rights
• username and password // biometrics // user accounts
• backup // disk mirroring
• firewall
• Physical methods (e.g. CCTV, locked rooms etc.)
Integrity
• checksum
• parity
• validation on input
2(a) 1 mark per bullet point to max 4 for each management task, max 6 in total 6
Process Management
• Manages the scheduling of processes
• « allows multi-tasking / multi-processing
• « ensures fair access
• « handles priorities
• Manages which resources the processes require
• Enables processes to share information
• Prevents interference between processes // resolution of conflicts
Memory Management
• Allocates memory to processes
• Ensures fair usage of memory
• Organises memory / by example
• Makes use of virtual memory
• Keep processes separate
• To release memory when a process stops
2(b)(iii) 1 mark for naming a feature, 1 mark for description, max 2 marks for each 4
feature
e.g.
• Amplify
• ... Increase the volume of a section of sound
• Change pitch
• ... Increase/decrease frequency of section(s)
Benefit:
• Programs may be interpreted on different platforms
Drawback:
• Intermediate code / program still needs to be interpreted on the user’s
computer, which may run slowly
• Extra CPU resources may be required
• The router has the public IP address for the home network
• All data comes through the router
• The laptop is not accessible / visible to the outside world
• … to ensure security // to protect the laptop from external threats
• Satellite
• Send data to satellites in orbit